The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security community, such as threat indicators of compromises (IoCs) and the corresponding scripts/tools TAU developed to extract the IoCs. The IoCs are typically used/discussed in TAU's published research papers such as repo…
☆17Mar 25, 2023Updated 2 years ago
Alternatives and similar repositories for tau-research
Users that are interested in tau-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ☆17Mar 13, 2026Updated last week
- ☆19Feb 26, 2026Updated 3 weeks ago
- CS-Eval is a comprehensive evaluation suite for fundamental cybersecurity models or large language models' cybersecurity ability.☆60Nov 27, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- testing build any version Bulletin Broadcast System (電子佈告欄系統) in docker image☆17Aug 10, 2025Updated 7 months ago
- 願人類榮耀長存!Glory to Mankind!☆10Jul 19, 2023Updated 2 years ago
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- ☆38Jun 10, 2024Updated last year
- ☆11Oct 13, 2020Updated 5 years ago
- translate project of Drops☆11May 26, 2016Updated 9 years ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated 2 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- ☆22Apr 2, 2025Updated 11 months ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- A cheap and easy to build digital Theremin☆10Jan 29, 2026Updated last month
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- ☆20Jul 23, 2023Updated 2 years ago
- Orthrus PIDS (USENIX Sec'25) official code☆35Feb 11, 2026Updated last month
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆36Jan 10, 2026Updated 2 months ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- ☆13Jan 24, 2022Updated 4 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- ☆19Nov 27, 2023Updated 2 years ago
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 3 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆96Apr 30, 2024Updated last year