Historical Observations of Actionable Reputation Data
☆13Jun 26, 2018Updated 7 years ago
Alternatives and similar repositories for hoard
Users that are interested in hoard are comparing it to the libraries listed below
Sorting:
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆16Jul 19, 2017Updated 8 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Leak File Analyzer☆63Nov 12, 2017Updated 8 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- Binary Ninja Posters☆35Oct 14, 2020Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago
- Python library for serial character LCD displays (MatrixOrbital, CrystalFontz, etc)☆14Feb 9, 2014Updated 12 years ago
- 鉴穹日志安全分析系统☆18Sep 7, 2025Updated 5 months ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Tools for diffing and comparing web content. Also includes a web server that makes diffs available as an HTTP service.☆18Feb 20, 2026Updated last week
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Automated Use Case Testing☆171May 1, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Common weakness enumeration library for Python☆16Mar 17, 2024Updated last year
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- DEPRECATED 🎓 learning locker docker images☆11Jul 3, 2020Updated 5 years ago
- Three different shellcode techniques on the Windows Kernel☆15Apr 8, 2025Updated 10 months ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- webshell编码工具 支持 jsp net php asp编码免杀☆27Dec 16, 2025Updated 2 months ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago