Low budget VirusTotal Intelligence Cosplay
☆20Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for VTI-Cosplay
Users that are interested in VTI-Cosplay are comparing it to the libraries listed below
Sorting:
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- ☆16Apr 30, 2024Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- 🖼 imgify - Convert any file to PNG and back.☆13Oct 20, 2025Updated 4 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- ☆12Oct 2, 2022Updated 3 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆19Mar 15, 2024Updated last year
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated 2 weeks ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago