romainmarcoux / malicious-hashView external linksLinks
Aggregation of lists of malicious hashes of malware that can be integrated into FortiGate firewalls and other products.
☆37Updated this week
Alternatives and similar repositories for malicious-hash
Users that are interested in malicious-hash are comparing it to the libraries listed below
Sorting:
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆15Jul 4, 2025Updated 7 months ago
- TrueMedia.org web application for querying multiple deepfake detection models and analyzing results☆21Jan 24, 2025Updated last year
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated 2 weeks ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- ☆17Jan 20, 2026Updated 3 weeks ago
- ☆11Apr 27, 2025Updated 9 months ago
- FortiGate WebUI Tools☆13Nov 10, 2023Updated 2 years ago
- Plex Media Server Deployment on Kubernetes☆15Nov 26, 2025Updated 2 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Aug 31, 2025Updated 5 months ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- ☆18Jan 31, 2025Updated last year
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- Apuntes de "Programación de servicios y procesos"☆12Nov 28, 2018Updated 7 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 3 months ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 8 months ago
- Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark (http…☆13Jan 18, 2017Updated 9 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 8 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Tools for Wazuh by Juan C. Tello☆15Jan 13, 2022Updated 4 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Sep 29, 2024Updated last year
- Personal scripts☆15Sep 11, 2024Updated last year
- Utility to detect routers with SIP ALG enabled☆15Jul 18, 2017Updated 8 years ago
- Android application for running Windows applications with Wine and Box86/Box64☆29Jul 24, 2025Updated 6 months ago
- ☆13Aug 11, 2020Updated 5 years ago
- rclone based backup tool for easier backup and restore with options.☆17Jan 11, 2026Updated last month
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆31Dec 5, 2025Updated 2 months ago
- ☆16Jan 17, 2025Updated last year
- Hardening Standalone Windows Server installations. LIST OF RULES NOT A PLUGIN☆13Jan 30, 2017Updated 9 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Feb 6, 2026Updated last week
- Mail Header Detective is a powerful tool that can help dissect complex email headers, providing useful insights and valuable information …☆14May 5, 2024Updated last year
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 8 years ago
- Dotfiles for BSPWM config☆13Apr 27, 2023Updated 2 years ago
- Криптор на шелл-кодах☆11May 3, 2020Updated 5 years ago
- An internet based electronic voting system☆13Dec 30, 2016Updated 9 years ago