kwouffe / cryptonote-hunt
Hunting cryptonote-related miners
☆22Updated 4 years ago
Alternatives and similar repositories for cryptonote-hunt:
Users that are interested in cryptonote-hunt are comparing it to the libraries listed below
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- ☆22Updated 7 years ago
- Tools☆13Updated last year
- ☆9Updated 7 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- ☆68Updated 7 years ago
- A script to track malware IOCs with OSINT on Twitter.☆53Updated 10 months ago
- Volatility Plugins☆21Updated 9 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- ☆19Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago
- ☆16Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Network sinkhole for isolated malware analysis☆40Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago