Download all packet captures from http://malware-traffic-analysis.net/
☆20Aug 14, 2014Updated 11 years ago
Alternatives and similar repositories for malware-traffic
Users that are interested in malware-traffic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A transform to show the latest copy of the website from the Wayback Machine☆17Nov 25, 2014Updated 11 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 3 months ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Decorators to make REST easier in Bottle.☆21Jun 20, 2022Updated 3 years ago
- A friendlier interface to `socket`.☆14Apr 11, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Honeypot for file uploads. Written in Go.☆16Feb 14, 2026Updated last month
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Load MISP events into memcached for log enrichment using logstash☆12Jul 10, 2020Updated 5 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- ☆18Jan 18, 2022Updated 4 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Tool for navigating Python call graphs. Old project page: https://github.com/nccgroup/call_map☆18Apr 10, 2023Updated 3 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆13Apr 16, 2020Updated 5 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Funnel is a lightweight yara-based feed scraper☆38May 22, 2023Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago