likekabin / CyberMonitor-APT_CyberCriminal_Campagin_CollectionsView external linksLinks
☆34Aug 20, 2018Updated 7 years ago
Alternatives and similar repositories for CyberMonitor-APT_CyberCriminal_Campagin_Collections
Users that are interested in CyberMonitor-APT_CyberCriminal_Campagin_Collections are comparing it to the libraries listed below
Sorting:
- Mitre chopshop network decoder framework☆30Oct 13, 2025Updated 4 months ago
- EmoKill is an Emotet process detection and killing tool for Windows OS. It avoids wasting time after detection of Emotet. Any process t…☆13Dec 8, 2022Updated 3 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆16Jan 14, 2026Updated last month
- Official website for Winter of Code☆11Dec 1, 2025Updated 2 months ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- The goal of this repository is to accelerate Azure OpenAI service adoption and put an enterprise governance structure around it using Azu…☆12Sep 13, 2023Updated 2 years ago
- CLI generator for Velociraptor offline collector☆15Oct 10, 2025Updated 4 months ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆15Jan 17, 2025Updated last year
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 7 years ago
- A Web Self Service Application for Generating OpenC2 Commands☆10Sep 26, 2019Updated 6 years ago
- Welcome to the LLM Tutorials and RAG Implementations repository! This repository provides tutorials, guides, and implementations for work…☆11Jul 1, 2025Updated 7 months ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Hunt the windows Registry automatically using VQL☆13Jan 6, 2026Updated last month
- Simple python script for brute force attack to smtp users☆12Mar 15, 2024Updated last year
- TeamsSix 的个人博客☆10Sep 6, 2025Updated 5 months ago
- Simple Python 3 HTTP server for logging all GET and POST requests☆10Jun 16, 2020Updated 5 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Project Interoperability: A Start-Up Guide to Info Sharing☆29Nov 22, 2016Updated 9 years ago
- A protobuf debugging tool or protoc --decode_raw on steroids.☆13Mar 30, 2023Updated 2 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- ☆10Sep 24, 2025Updated 4 months ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- Jadx Python Binding☆14Mar 24, 2019Updated 6 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- My dot files and other profile settings☆18Feb 8, 2026Updated last week
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- 常用字典收集☆10Mar 23, 2021Updated 4 years ago
- Useful cyber security and digital forensics resources☆15Oct 20, 2020Updated 5 years ago
- a python disassembler for the dex format used by dalvik.☆10Aug 23, 2016Updated 9 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- A simple tool for copying disks into image files.☆13Jul 17, 2022Updated 3 years ago
- 各类域名数据处理☆12Jul 24, 2024Updated last year
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc☆10Apr 28, 2025Updated 9 months ago
- ☆16May 15, 2025Updated 9 months ago
- Code record☆14Aug 4, 2019Updated 6 years ago