AMICO - Accurate Behavior-Based Detection of Malware Downloads
☆31Nov 13, 2017Updated 8 years ago
Alternatives and similar repositories for amico
Users that are interested in amico are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Feb 17, 2015Updated 11 years ago
- Measurement system I built during my PhD to collect and analyse large-scale datasets; including phishing and malware attacks on Twitter, …☆16Jun 25, 2021Updated 4 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Record and Replay Engine for Web Browsers☆16Sep 25, 2015Updated 10 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- The markdown source of the OpenYOLO Specification☆11May 3, 2017Updated 8 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- Portable OpenSSH openssh-hpn-isshd☆11Dec 24, 2024Updated last year
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Common Lisp implementation of Google's Snappy data compression library, which is also known as Zippy compression.☆19Mar 12, 2026Updated 2 weeks ago
- Malware.lu tools☆64Oct 28, 2013Updated 12 years ago
- Python API for URL Query☆36May 22, 2016Updated 9 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Common Lisp metaclass adding support for slot validation☆11Mar 31, 2025Updated 11 months ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- ☆11Jul 19, 2021Updated 4 years ago
- A static deobfuscator for JavaScript Malware☆13May 6, 2020Updated 5 years ago
- Python buildpack with Numpy 1.7.0, SciPy 0.11.0 and a current version of Scikit-learn.☆31Aug 4, 2014Updated 11 years ago
- Uniform Resource Locators for Common Lisp☆21Jun 11, 2025Updated 9 months ago
- OpenCPU Demo Application☆18Jul 2, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- ☆15Mar 17, 2026Updated last week
- Compute and draw 3d graphs based on Gephi toolkit☆17Sep 9, 2022Updated 3 years ago
- Slides, Code, and Exercises to support [R Quickstart tutorial](http://conferences.oreilly.com/strata/hadoop-big-data-ca/public/schedule/d…☆10Mar 25, 2016Updated 10 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago