Lightweight Python-Based Malware Analysis Pipeline
☆40Mar 3, 2026Updated 2 months ago
Alternatives and similar repositories for malware-analysis-pipeline
Users that are interested in malware-analysis-pipeline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 5 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆52May 11, 2026Updated last week
- Open vSwitch in Container☆19Jan 15, 2020Updated 6 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- A mapping of used malware names to commonly known family names☆63Feb 21, 2023Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- Side channel-based network measurement tools.☆15Sep 1, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆21Jun 6, 2023Updated 2 years ago
- ☆11Apr 10, 2024Updated 2 years ago
- Manager for remote ~/.ssh/authorized_keys☆13Mar 20, 2013Updated 13 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Apr 8, 2026Updated last month
- BlackBerry Threat Research & Intelligence☆99Oct 20, 2023Updated 2 years ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆309Mar 10, 2026Updated 2 months ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 5 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Privilege escalation using dmidecode☆21May 6, 2019Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- This software is an API in C++ to decode and encode ASTERIX data☆11Mar 8, 2018Updated 8 years ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated 2 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Using open Adb ports we can exploit a Andriod Device☆19Jun 30, 2019Updated 6 years ago
- privilege escalation POCs built in Rust.☆20Jun 30, 2022Updated 3 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- SSH Over websockets☆12Jul 12, 2018Updated 7 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Apr 22, 2021Updated 5 years ago