An Adaptive Misuse Detection System
☆46Nov 4, 2024Updated last year
Alternatives and similar repositories for amides
Users that are interested in amides are comparing it to the libraries listed below
Sorting:
- ☆23Nov 29, 2023Updated 2 years ago
- ☆61Jun 24, 2023Updated 2 years ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 2 months ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- ☆10Jan 21, 2022Updated 4 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- A configurable rule-based labeling tool for network flow files.☆18May 22, 2023Updated 2 years ago
- ☆20May 30, 2025Updated 9 months ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Nov 22, 2023Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Oct 28, 2023Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Jan 10, 2025Updated last year
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 5 months ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- ☆20May 18, 2022Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Script to process PDF files☆21May 23, 2025Updated 9 months ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆54Jul 12, 2022Updated 3 years ago
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago
- ☆22Aug 29, 2024Updated last year