Download all packet captures from http://malware-traffic-analysis.net/
☆20Aug 14, 2014Updated 11 years ago
Alternatives and similar repositories for malware-traffic
Users that are interested in malware-traffic are comparing it to the libraries listed below
Sorting:
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A transform to show the latest copy of the website from the Wayback Machine☆17Nov 25, 2014Updated 11 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 2 months ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Decorators to make REST easier in Bottle.☆21Jun 20, 2022Updated 3 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 14 years ago
- A friendlier interface to `socket`.☆14Apr 11, 2015Updated 10 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Honeypot for file uploads. Written in Go.☆16Feb 14, 2026Updated last month
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Load MISP events into memcached for log enrichment using logstash☆12Jul 10, 2020Updated 5 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- ☆18Jan 18, 2022Updated 4 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- ☆10Mar 27, 2017Updated 8 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Tool for navigating Python call graphs. Old project page: https://github.com/nccgroup/call_map☆18Apr 10, 2023Updated 2 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago