intel / Resilient-ML-Research-Platform
☆80Updated 2 years ago
Alternatives and similar repositories for Resilient-ML-Research-Platform
Users that are interested in Resilient-ML-Research-Platform are comparing it to the libraries listed below
Sorting:
- ☆52Updated 10 years ago
- Android Automation Tool☆21Updated 7 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- ANWI - All New Wireless IDS☆29Updated 6 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- Snort rules☆35Updated 6 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆51Updated 9 years ago
- ☆42Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- Pre-OS microcode updater☆43Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆40Updated 2 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- snake - a malware storage zoo☆216Updated last year
- Malware detection using learning and information retrieval for Android☆73Updated 4 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 9 months ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- A sample IoT bot origin from Mirai☆20Updated 8 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 5 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- defplorex for BlackHat Arsenal☆116Updated 7 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆53Updated 9 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Slides, papers, etc☆31Updated last year
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago