Hunting cryptonote-related miners
☆23Nov 3, 2020Updated 5 years ago
Alternatives and similar repositories for cryptonote-hunt
Users that are interested in cryptonote-hunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The paste analyzer☆27Mar 19, 2021Updated 5 years ago
- ☆14May 18, 2022Updated 3 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Nov 3, 2025Updated 4 months ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- Automatic attack detector and botnet classifier☆28Jan 10, 2017Updated 9 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 11 months ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Definition, description and relationship types of MISP objects☆106Mar 18, 2026Updated last week
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- ☆23May 19, 2019Updated 6 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆24Jun 29, 2025Updated 8 months ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Mar 2, 2026Updated 3 weeks ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Jul 27, 2017Updated 8 years ago
- Simple DNS honeypot script☆51Jan 23, 2026Updated 2 months ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Unofficial The Commonwealth Bank of Australia NetBank API wrap for PHP☆11Feb 3, 2019Updated 7 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last month
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year