eyalmazuz / ThreatIntelligenceCorpusView external linksLinks
☆34Mar 31, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatIntelligenceCorpus
Users that are interested in ThreatIntelligenceCorpus are comparing it to the libraries listed below
Sorting:
- ☆19Mar 31, 2019Updated 6 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- ☆11Aug 21, 2016Updated 9 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- USB testing framework☆14May 22, 2023Updated 2 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆17Jan 29, 2019Updated 7 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- Simplest lock file implementation☆15Sep 25, 2019Updated 6 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Current CIDR-formatted list of unwanted bots caught on my systems.☆17Sep 28, 2021Updated 4 years ago
- age-rs - Cross-platform RTS game engine core based on Age of Empires mechanics☆18Nov 29, 2021Updated 4 years ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- This Project uses a Panda board mounted on top of my drone (the attacker) to hijack other drones autonomously and fly them back to the st…☆16May 20, 2014Updated 11 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- ☆21Jan 24, 2016Updated 10 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- Open-Source firmware for chinese electronic load 60W/110W ZPB30A1☆17Oct 22, 2021Updated 4 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Nov 14, 2018Updated 7 years ago
- ida插件☆31Feb 29, 2016Updated 9 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- tiny embedded MIPS virtualization platform - a very small and lean hypervisor using MIPS R5 hardware VZ option for embedded systems (IoT …☆20Sep 26, 2023Updated 2 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- remote function calling☆17Dec 12, 2015Updated 10 years ago
- ☆18Mar 15, 2018Updated 7 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- Sample files for fuzzing ImageMagick☆19May 10, 2017Updated 8 years ago
- A simple way to write CS:GO cheats!☆17Sep 1, 2016Updated 9 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆59Mar 27, 2017Updated 8 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Binary Ninja plugin suite for SEGA Genesis ROM hacking☆27Nov 4, 2024Updated last year