Community-based integrated malware identification system
☆81Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for tknk_scanner
Users that are interested in tknk_scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Open KLara Project☆35Feb 12, 2026Updated 2 months ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 4 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Simple RISC-V emulator☆16Sep 4, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆478Apr 8, 2021Updated 5 years ago
- ☆64Apr 1, 2021Updated 5 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bat file to collect software and hardware system information without admin permissions.☆14Feb 17, 2022Updated 4 years ago
- An extensible honeypot framework☆95Jul 15, 2022Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 10 months ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆164Sep 11, 2022Updated 3 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Enterprise Security Response Center Development Framework☆11Jan 2, 2017Updated 9 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Jan 8, 2020Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago