A library for binaries feature extraction
☆12Nov 22, 2024Updated last year
Alternatives and similar repositories for extractor
Users that are interested in extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decrypt and log process SSL traffic via Frida Injection☆18Feb 25, 2022Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- ☆12May 2, 2022Updated 3 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- A fast pure-Python search engine☆12Apr 9, 2009Updated 17 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Prepend `https://` to humanized URLs like `sindresorhus.com` and `file://` to file paths☆25Jul 9, 2022Updated 3 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 9 months ago
- Bilinear Pairings Components Library for Delphi☆12Dec 19, 2018Updated 7 years ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 9 months ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Delphi Port of Minecraft☆12Nov 7, 2015Updated 10 years ago
- Detect bots/crawlers/spiders via user-agent string☆13Feb 22, 2026Updated last month
- Simple tool to hide drives in Windows File Explorer☆14Jun 22, 2020Updated 5 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Get the bundle identifier of the default browser (macOS). Example: com.apple.Safari☆13Nov 14, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TWinEventHook allows you to hook into certain Windows events.☆11Sep 20, 2019Updated 6 years ago
- Pascal Script usage example☆14Mar 27, 2013Updated 13 years ago
- Scrap content from: gelbooru, rule34.xxx, realbooru.com and more.☆15Oct 5, 2024Updated last year
- Trim a consecutively repeated substring: foo--bar---baz → foo-bar-baz☆20Jul 9, 2022Updated 3 years ago
- coroutine library for Delphi☆10Nov 21, 2019Updated 6 years ago
- Owner drawn virtual list view for Delphi☆14Aug 22, 2025Updated 7 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago