Use Markov Chains to obfuscate data as other data
☆54Aug 3, 2016Updated 9 years ago
Alternatives and similar repositories for MarkovObfuscate
Users that are interested in MarkovObfuscate are comparing it to the libraries listed below
Sorting:
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Dec 7, 2022Updated 3 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- ☆13Jul 14, 2020Updated 5 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- OpenTitan: Open source silicon root of trust☆10Feb 5, 2020Updated 6 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 4 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- Updated version of C2K☆51Mar 22, 2018Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- ☆14Jul 9, 2024Updated last year
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 7 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago