Download all packet captures from http://malware-traffic-analysis.net/
☆20Aug 14, 2014Updated 11 years ago
Alternatives and similar repositories for malware-traffic
Users that are interested in malware-traffic are comparing it to the libraries listed below
Sorting:
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Decorators to make REST easier in Bottle.☆21Jun 20, 2022Updated 3 years ago
- A friendlier interface to `socket`.☆14Apr 11, 2015Updated 10 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- malware-traffic-analysis.net PCAPs repository.☆38Jun 9, 2016Updated 9 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- Extremely lightweight monitoring system.☆26Apr 22, 2015Updated 10 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- http://malware.wicar.org HTML content, which includes test browser exploits. See http://wicar.org/ for details.☆32Jul 10, 2018Updated 7 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 13 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago