Bit9 Platform
☆20Jun 23, 2017Updated 8 years ago
Alternatives and similar repositories for bit9platform
Users that are interested in bit9platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Carbon Black API Resources☆93Jan 11, 2018Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Carbon Black integration Python utility library☆12Oct 29, 2020Updated 5 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 5 months ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Carbon Black API - Python language bindings☆145Aug 22, 2024Updated last year
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- Carbon Black Feeds☆73Apr 4, 2023Updated 3 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Aug 13, 2017Updated 8 years ago
- DSSL library: network capture and SSL decryption toolkit☆25Jul 21, 2019Updated 6 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- ☆14Oct 5, 2013Updated 12 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Carbonblack Live Response from the comfort of your own terminal☆20Jan 20, 2016Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Sep 11, 2016Updated 9 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago