fkie-cad / amidesView external linksLinks
An Adaptive Misuse Detection System
☆46Nov 4, 2024Updated last year
Alternatives and similar repositories for amides
Users that are interested in amides are comparing it to the libraries listed below
Sorting:
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Jun 5, 2025Updated 8 months ago
- ☆23Nov 29, 2023Updated 2 years ago
- ☆61Jun 24, 2023Updated 2 years ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated last month
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Active C&C Detector☆155Oct 5, 2023Updated 2 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Nov 22, 2023Updated 2 years ago
- ☆20May 30, 2025Updated 8 months ago
- A configurable rule-based labeling tool for network flow files.☆18May 22, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Oct 28, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- TsTeleport Dynamic Virtual Channel Example Experimentation☆15Feb 2, 2014Updated 12 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆28Sep 10, 2025Updated 5 months ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 4 months ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆24May 20, 2023Updated 2 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Script to process PDF files☆21May 23, 2025Updated 8 months ago
- ☆20May 18, 2022Updated 3 years ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago