wicar / malware.wicar.orgView external linksLinks
http://malware.wicar.org HTML content, which includes test browser exploits. See http://wicar.org/ for details.
☆32Jul 10, 2018Updated 7 years ago
Alternatives and similar repositories for malware.wicar.org
Users that are interested in malware.wicar.org are comparing it to the libraries listed below
Sorting:
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆69Mar 9, 2015Updated 10 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 6 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆24Feb 7, 2026Updated last week
- Terraform provider for Prisma Cloud☆11Jun 24, 2020Updated 5 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- GPG key integration for Blockstack client applications☆10Aug 1, 2017Updated 8 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Server for managing OpenVPN certificates☆14Aug 18, 2014Updated 11 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- Lazy Hacker Editor. Because nothing beats the eficiency of writing code already written. This is that kind of editor. Just for real hacke…☆10Dec 28, 2024Updated last year
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Application which generates the structure and related files necessary for developing a Data Exchange Layer (DXL) integration with Python☆12Mar 17, 2020Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- CAN Firewall project☆13Dec 17, 2015Updated 10 years ago
- nexpose python client library☆10Oct 12, 2019Updated 6 years ago
- Per-group password policy for keycloak☆15Sep 27, 2025Updated 4 months ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago