r00tten / VTI-CosplayView external linksLinks
Low budget VirusTotal Intelligence Cosplay
☆20Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for VTI-Cosplay
Users that are interested in VTI-Cosplay are comparing it to the libraries listed below
Sorting:
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- ☆16Apr 30, 2024Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- 🖼 imgify - Convert any file to PNG and back.☆13Oct 20, 2025Updated 3 months ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 7 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 8 months ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Apr 22, 2022Updated 3 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year