☆35Mar 31, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatIntelligenceCorpus
Users that are interested in ThreatIntelligenceCorpus are comparing it to the libraries listed below
Sorting:
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- USB testing framework☆14May 22, 2023Updated 2 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆17Jan 29, 2019Updated 7 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- 😈 Hardware USB keylogger project with Arduino.☆17Feb 2, 2017Updated 9 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Current CIDR-formatted list of unwanted bots caught on my systems.☆17Sep 28, 2021Updated 4 years ago
- ☆21Jan 24, 2016Updated 10 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Nov 14, 2018Updated 7 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- Open-Source firmware for chinese electronic load 60W/110W ZPB30A1☆17Oct 22, 2021Updated 4 years ago
- ida插件☆31Feb 29, 2016Updated 10 years ago
- tiny embedded MIPS virtualization platform - a very small and lean hypervisor using MIPS R5 hardware VZ option for embedded systems (IoT …☆20Sep 26, 2023Updated 2 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆27Apr 12, 2024Updated last year
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- A simple way to write CS:GO cheats!☆17Sep 1, 2016Updated 9 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆58Mar 27, 2017Updated 8 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Binary Ninja plugin suite for SEGA Genesis ROM hacking☆27Nov 4, 2024Updated last year
- IDA recompiler☆31Dec 8, 2014Updated 11 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- The collection of all Python program from various CTF's☆26Oct 11, 2015Updated 10 years ago
- An integrated printed circuit board reverse engineering toolkit☆81Mar 16, 2024Updated last year