Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land
☆11Jul 7, 2021Updated 4 years ago
Alternatives and similar repositories for livingofftheland
Users that are interested in livingofftheland are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Nov 29, 2021Updated 4 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆36Aug 18, 2024Updated last year
- ☆26Jun 25, 2021Updated 4 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆13Dec 5, 2024Updated last year
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 8 months ago
- 整理容器逃逸相关的漏洞和exploits.☆15Apr 17, 2024Updated last year
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Jul 11, 2022Updated 3 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Framework to test Ansible roles with serverspec on multiple systems☆13Mar 7, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Spring-Cloud-Spel-RCE☆12Sep 16, 2022Updated 3 years ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Large scale server deploys using BitTorrent and the BitTornado library by Murder (https://github.com/lg/murder)☆30Oct 21, 2013Updated 12 years ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆15Jan 9, 2026Updated 2 months ago
- Saturate the bad guys' databases.☆14Jan 19, 2024Updated 2 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- Canari local transforms pcap file analysis☆30Apr 14, 2014Updated 11 years ago
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🚀 MariaDB is a community-developed, commercially supported relational database management system. This repo provides you with an introdu…☆10Apr 1, 2025Updated 11 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆12Jul 7, 2024Updated last year
- Network Emulator based on NS3 and Docker, with the help of NS3 docs, Docker docs and some ideas from some research papers☆26Jan 10, 2019Updated 7 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆371Nov 10, 2022Updated 3 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- Sample Industry 4.0 Asset Administration Shell API for Azure Digital Twins☆21Mar 13, 2023Updated 3 years ago
- A quick and dirty utility to capture and store WiFi probes.☆18Dec 14, 2013Updated 12 years ago
- ☆30Nov 29, 2021Updated 4 years ago
- ☆13Jan 22, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆19Dec 1, 2024Updated last year
- ☆11Jul 26, 2022Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆29Aug 21, 2023Updated 2 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Encyclopedia of SJTU☆25Mar 16, 2026Updated 2 weeks ago
- Warehouse management system using RFID and Raspberry Pi for Industry 4.0☆19Jun 28, 2020Updated 5 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago