Lightweight Python-Based Malware Analysis Pipeline
β39Mar 3, 2026Updated last month
Alternatives and similar repositories for malware-analysis-pipeline
Users that are interested in malware-analysis-pipeline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract the Procedures (TTP) from CTI reportsβ18Dec 13, 2025Updated 4 months ago
- π§ Currently transfering TLP:CLEAR rules from TLP:AMBER repository...β21Mar 22, 2024Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data modelβ52Apr 8, 2026Updated last week
- β24Sep 28, 2022Updated 3 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.β13Dec 10, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Maps process creation logged by Sysmon uses Google Org Chart APIβ23Mar 5, 2016Updated 10 years ago
- tools for creating, inspecting and modifying torrent filesβ13Jun 1, 2022Updated 3 years ago
- β19May 20, 2025Updated 10 months ago
- eBPF-based EDR for Linuxβ18Aug 25, 2024Updated last year
- A mapping of used malware names to commonly known family namesβ63Feb 21, 2023Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Aug 4, 2021Updated 4 years ago
- Esto es una recopilaciΓ³n de herramientas, laboratorios y contenido utilizado para el curso de OSINT ofrecido por academia-ciberseguridad.β¦β16Oct 14, 2022Updated 3 years ago
- β21Jun 6, 2023Updated 2 years ago
- Side channel-based network measurement tools.β15Sep 1, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- β10Apr 10, 2024Updated 2 years ago
- Manager for remote ~/.ssh/authorized_keysβ13Mar 20, 2013Updated 13 years ago
- Repository with selected IOCs and YARA rules for threat hunting.β35Apr 8, 2026Updated last week
- β34Aug 5, 2022Updated 3 years ago
- BlackBerry Threat Research & Intelligenceβ97Oct 20, 2023Updated 2 years ago
- DFIQ is a collection of investigative questions and the approaches for answering themβ306Mar 10, 2026Updated last month
- A Jenkins Pentest/Security Toolkit written in Pythonβ15Sep 18, 2017Updated 8 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.β14Aug 18, 2021Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Filesβ12Mar 21, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Component Services Volatile Environment LPEβ12Jun 28, 2025Updated 9 months ago
- A mini project to exfiltrate data via QR codesβ19Dec 5, 2025Updated 4 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalationβ12Oct 27, 2020Updated 5 years ago
- A Proof of Concept (PoC) IRC backdoor written in Pythonβ11Jan 29, 2021Updated 5 years ago
- Malware Classifier From Network Capturesβ82Jan 27, 2017Updated 9 years ago
- Privilege escalation using dmidecodeβ21May 6, 2019Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.β15Nov 23, 2024Updated last year
- This software is an API in C++ to decode and encode ASTERIX dataβ11Mar 8, 2018Updated 8 years ago
- URL fingerprinting made easyβ89Apr 13, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code and notes regarding Malware Developmentβ11Oct 30, 2022Updated 3 years ago
- Using open Adb ports we can exploit a Andriod Deviceβ19Jun 30, 2019Updated 6 years ago
- privilege escalation POCs built in Rust.β20Jun 30, 2022Updated 3 years ago
- Pure Javascript/CSS Hex Viewerβ17Mar 3, 2014Updated 12 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigβ10Sep 20, 2020Updated 5 years ago
- Download all packet captures from http://malware-traffic-analysis.net/β20Aug 14, 2014Updated 11 years ago
- Burp extension to automatically drop requests that match a certain regex.β10Mar 10, 2023Updated 3 years ago