☆16Feb 22, 2026Updated last month
Alternatives and similar repositories for ohmymalware
Users that are interested in ohmymalware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated last month
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 3 years ago
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 4 years ago
- Detection Rule License (DRL)☆21Dec 27, 2024Updated last year
- A Rust library for parsing and evaluating Sigma rules☆21Nov 26, 2025Updated 4 months ago
- The home of the SDDLMaker☆29Jan 13, 2025Updated last year
- Ingest Nessus files into Elasticsearch using PowerShell!☆21Apr 26, 2024Updated last year
- An IOC framework written in PowerShell☆19Jan 3, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- mobile application (ipa & apk) static analysis tool☆16May 23, 2025Updated 10 months ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated 2 years ago
- ☆114Updated this week
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Wazuh wodle that integrates Google Workspace admin events (just like the O365 integration)☆31Jan 26, 2026Updated 2 months ago
- ☆22Jan 6, 2025Updated last year
- ☆23May 7, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- The Developer's Guide to AI - A Field Guide for the Working Developer☆35Apr 9, 2026Updated last week
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆92Mar 2, 2021Updated 5 years ago
- Rust Windows EDR (user-mode, no driver): ETW → Sysmon-style normalization → Sigma/Yara/IOC detection → ECS NDJSON alerts.☆101Mar 4, 2026Updated last month
- Cloudshell proof of concept for LiveOverflow☆15Aug 8, 2019Updated 6 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- Tools and Techniques for Blue Team / Incident Response☆23Mar 8, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Shell script to download apps from Splunkbase☆24May 19, 2020Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- Using ImpersonatedCredentials for Google Cloud API and id_tokens☆16Aug 22, 2022Updated 3 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 6 months ago
- An Ansible role that runs Vulhub environments on a Linux system.☆21Oct 15, 2025Updated 6 months ago