☆22Jun 18, 2015Updated 10 years ago
Alternatives and similar repositories for sonyhack
Users that are interested in sonyhack are comparing it to the libraries listed below
Sorting:
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Bot to create MISP events from data in Slack☆17Jan 10, 2024Updated 2 years ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- A Simple Network Stream Recorder☆35Mar 23, 2019Updated 6 years ago
- Examples and demos for my LCA2015 radare2 reverse engineering tutorial☆24Jan 15, 2015Updated 11 years ago
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- C++ wrapper for YARA.☆45Jan 27, 2020Updated 6 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Different DFIR and CTI utilities☆38May 13, 2020Updated 5 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- My dotfiles☆12Feb 9, 2026Updated 2 weeks ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Aug 17, 2021Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- A pre-authenticated RCE exploit for Inductive Automation Ignition☆48Jul 18, 2022Updated 3 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- ☆10Apr 10, 2024Updated last year
- 基于机器学习的Webshell检测工具☆12May 15, 2023Updated 2 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago