☆35Mar 31, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatIntelligenceCorpus
Users that are interested in ThreatIntelligenceCorpus are comparing it to the libraries listed below
Sorting:
- ☆19Mar 31, 2019Updated 6 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- ☆11Aug 21, 2016Updated 9 years ago
- USB testing framework☆14May 22, 2023Updated 2 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- A repository of Tor hidden services.☆65Nov 22, 2021Updated 4 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆17Jan 29, 2019Updated 7 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- 😈 Hardware USB keylogger project with Arduino.☆17Feb 2, 2017Updated 9 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- Mirror of tutorials☆13Jan 11, 2016Updated 10 years ago
- Current CIDR-formatted list of unwanted bots caught on my systems.☆17Sep 28, 2021Updated 4 years ago
- This Project uses a Panda board mounted on top of my drone (the attacker) to hijack other drones autonomously and fly them back to the st…☆16May 20, 2014Updated 11 years ago
- age-rs - Cross-platform RTS game engine core based on Age of Empires mechanics☆18Nov 29, 2021Updated 4 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- ☆21Jan 24, 2016Updated 10 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- tiny embedded MIPS virtualization platform - a very small and lean hypervisor using MIPS R5 hardware VZ option for embedded systems (IoT …☆20Sep 26, 2023Updated 2 years ago
- ida插件☆31Feb 29, 2016Updated 10 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- ☆18Mar 15, 2018Updated 7 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- remote function calling☆17Dec 12, 2015Updated 10 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- Sample files for fuzzing ImageMagick☆19May 10, 2017Updated 8 years ago