kwouffe / cryptonote-huntView external linksLinks
Hunting cryptonote-related miners
☆23Nov 3, 2020Updated 5 years ago
Alternatives and similar repositories for cryptonote-hunt
Users that are interested in cryptonote-hunt are comparing it to the libraries listed below
Sorting:
- The paste analyzer☆27Mar 19, 2021Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 3 months ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- ☆15May 18, 2022Updated 3 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 7 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Jun 20, 2022Updated 3 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆23Jun 29, 2025Updated 7 months ago
- ☆42Sep 16, 2022Updated 3 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Dec 2, 2025Updated 2 months ago
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Trident is a trusted and secure communication platform for enabling better communication between groups of trusted parties☆22Apr 17, 2025Updated 9 months ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 10 months ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 8 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 8 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Feb 2, 2022Updated 4 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago