☆15Feb 22, 2026Updated last week
Alternatives and similar repositories for ohmymalware
Users that are interested in ohmymalware are comparing it to the libraries listed below
Sorting:
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- ☆15Feb 25, 2026Updated last week
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- The Developer's Guide to AI - From Prompts to Agents☆28Feb 27, 2026Updated last week
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert☆13Apr 23, 2022Updated 3 years ago
- Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning☆13Mar 7, 2025Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- ☆13Oct 1, 2020Updated 5 years ago
- Wazuh wodle that integrates Google Workspace admin events (just like the O365 integration)☆28Jan 26, 2026Updated last month
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆16Feb 27, 2025Updated last year
- ☆15Aug 31, 2020Updated 5 years ago
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 3 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- How to design, build, and operate AI agents for infrastructure teams — safely. 13 chapters covering architecture, sandboxing, credentials…☆69Feb 26, 2026Updated last week
- ☆17Apr 30, 2024Updated last year
- ☆12Apr 28, 2025Updated 10 months ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 3 months ago
- An evaluation tool for memory safety sanitizers.☆19Feb 11, 2026Updated 3 weeks ago
- CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service☆16Oct 9, 2024Updated last year
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- mobile application (ipa & apk) static analysis tool☆16May 23, 2025Updated 9 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- ☆13Oct 27, 2022Updated 3 years ago
- ☆18Aug 30, 2024Updated last year
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆24Apr 11, 2025Updated 10 months ago
- ☆16Apr 12, 2023Updated 2 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- ☆17Nov 22, 2021Updated 4 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- ☆15Dec 27, 2022Updated 3 years ago
- Coverage gathering JVMTI agent for Android☆26Oct 11, 2023Updated 2 years ago
- ☆16Sep 14, 2023Updated 2 years ago