Download all packet captures from http://malware-traffic-analysis.net/
☆20Aug 14, 2014Updated 11 years ago
Alternatives and similar repositories for malware-traffic
Users that are interested in malware-traffic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 3 months ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 14 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Decorators to make REST easier in Bottle.☆21Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A friendlier interface to `socket`.☆14Apr 11, 2015Updated 11 years ago
- Automatic Malware Signature Generation Tool☆15Oct 13, 2021Updated 4 years ago
- Honeypot for file uploads. Written in Go.☆16Feb 14, 2026Updated 2 months ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 15 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Load MISP events into memcached for log enrichment using logstash☆12Jul 10, 2020Updated 5 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- API Tools☆27Apr 18, 2016Updated 10 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 5 months ago
- ☆18Jan 18, 2022Updated 4 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 11 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago