Create malware knowledge graphs from analysis reports
☆39Dec 6, 2023Updated 2 years ago
Alternatives and similar repositories for Malware-Knowledge-Graph
Users that are interested in Malware-Knowledge-Graph are comparing it to the libraries listed below
Sorting:
- IR drill plateform☆23Jul 29, 2025Updated 7 months ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- ☆15May 3, 2024Updated last year
- Orchestration Software for Incident Response☆14Updated this week
- Extract messages from a local Microsoft Teams installation☆15Jan 14, 2023Updated 3 years ago
- Patched GDB-Multiarch to debug android Kernels.☆14Jun 29, 2019Updated 6 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated 11 months ago
- ☆18Mar 28, 2023Updated 2 years ago
- Git+Ansible: watch git repo for changes and run only changed playbooks☆17Jan 23, 2023Updated 3 years ago
- ☆16May 22, 2014Updated 11 years ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Nov 3, 2022Updated 3 years ago
- This tool automates and facilitates an AES CBC BitFlip attack☆18Jan 17, 2024Updated 2 years ago
- .lib file for linking against the NT CRT☆19Mar 18, 2022Updated 3 years ago
- CVM is a header-only turing-complete virtual machine engine made in pure C.☆34Nov 25, 2024Updated last year
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Disassembler for Zeus VM custom instruction set☆31Feb 12, 2024Updated 2 years ago
- ☆36Feb 12, 2026Updated 2 weeks ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆144Updated this week
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆78Dec 16, 2024Updated last year
- UAC Bypass using CMSTP in Rust☆35Dec 6, 2024Updated last year
- ☆29Sep 4, 2024Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆36Dec 18, 2022Updated 3 years ago
- A collection of CVEs weaponized by ransomware operators☆130Oct 13, 2025Updated 4 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 9 months ago
- ☆31Feb 28, 2025Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆153Feb 25, 2026Updated last week
- Fabric Stain Detection System based on YOLO algorithm☆19Jan 28, 2025Updated last year
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Dec 10, 2021Updated 4 years ago
- The AMSI server for Avred☆33Sep 15, 2023Updated 2 years ago
- Web-based file browser☆38Aug 26, 2025Updated 6 months ago
- ☆31Oct 1, 2021Updated 4 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Sep 3, 2025Updated 6 months ago
- ☆19Nov 18, 2024Updated last year