luferIPCA / EDA-LESI-2024-2025Links
Código das aulas de Estruturas de Dados Avançadas dos cursos de LESI e LESI-N
☆13Updated 3 months ago
Alternatives and similar repositories for EDA-LESI-2024-2025
Users that are interested in EDA-LESI-2024-2025 are comparing it to the libraries listed below
Sorting:
- ☆9Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,940Updated last month
- yarGen is a generator for YARA rules☆1,668Updated 3 months ago
- MBC content in markdown☆464Updated last month
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆43Updated last year
- Yara Rule Analyzer and Statistics☆375Updated 2 years ago
- A python module for working with ATT&CK☆573Updated 2 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,675Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆597Updated last year
- Simple Bash IOC Scanner☆744Updated 3 years ago
- Digging Deeper....☆3,355Updated this week
- ☆406Updated 11 months ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,899Updated 2 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆473Updated 3 weeks ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,174Updated this week
- ReversingLabs YARA Rules☆830Updated 2 weeks ago
- CRITs - Collaborative Research Into Threats☆904Updated 5 years ago
- Cyber Analytics Repository☆949Updated 2 months ago
- Malware Analysis Fundamentals, by EC-Council☆20Updated 3 years ago
- Python library using the MISP Rest API☆470Updated last week
- Labs for Practical Malware Analysis & Triage☆988Updated 3 months ago
- Collection of Study Material for SANS - FOR610☆15Updated 4 years ago
- The Python interface for YARA☆701Updated last month
- OpenCTI Connectors☆450Updated last week
- STIX data representing MITRE ATT&CK☆427Updated 2 months ago
- Binaries for the book Practical Malware Analysis☆1,305Updated 3 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆573Updated last week
- Malware Sample Sources☆573Updated 4 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆802Updated last week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,163Updated this week