Scripts and rulesets for analysing the Winnti malware
☆24Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for 2019-winnti-analyse
Users that are interested in 2019-winnti-analyse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 25, 2026Updated 3 weeks ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆21Jul 29, 2018Updated 7 years ago
- ☆14Updated this week
- Empfehlungen für die Veröffentlichung von Open Source-Projekten bei BR Data☆26Jan 31, 2020Updated 6 years ago
- Repository for course materials related to Data and Databases. (Supercedes directories in "courses" repo)☆18Jul 7, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Nicar ML/NLP workshop by J Kao☆19Mar 7, 2019Updated 7 years ago
- Repository for the Algorithms course☆22Aug 17, 2016Updated 9 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- analysis of EDO soil moisture anomaly maps☆19Dec 4, 2022Updated 3 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Better visualize blurry (poll) data using confidence intervall☆22Dec 15, 2023Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Nmap Script to scan for Winnti infections☆71May 22, 2018Updated 7 years ago
- How to use machine learning to find interesting places on satellite maps☆53Aug 14, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- A short introduction to HTML5 canvas☆11Feb 7, 2018Updated 8 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆136Jan 24, 2019Updated 7 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- Visualize your Google Location History with Leaflet and the Leaflet heatmap plugin☆15Sep 15, 2020Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- Cross-platform interface to the Helium ecosystem, written in C.☆22Apr 15, 2015Updated 11 years ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated last year
- Encase Script to parse harddrive for MFT data☆16Jun 17, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- How to download geodata from fis broker wfs via qgis and save as it a shapefile.☆18Dec 9, 2014Updated 11 years ago
- Hare-Niemeyer aka. Hamilton or largest remainder method for seat distribution☆13Feb 19, 2024Updated 2 years ago
- This is a Leaflet map of the local Fairphoners communities☆10Apr 8, 2026Updated last week
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- ☆12Sep 4, 2013Updated 12 years ago