zk7 / hershelplus
An improved algorithm for large scale OS fingerprinting
☆15Updated 6 years ago
Related projects: ⓘ
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated last month
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆60Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆16Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Botnet Simulation Framework☆75Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆56Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆33Updated last month
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆34Updated 2 years ago
- A decryptor for systems infected by Avaddon ransomware.☆23Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 4 months ago
- This is a repository that is meant to hold detections for various process injection techniques.☆32Updated 4 years ago
- Advanced threat detection solution for Linux.☆35Updated 3 years ago
- ssdeep cluster analysis for malware files☆29Updated 4 years ago
- JA3 TLS Fingerprint database☆72Updated 4 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆18Updated 4 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆12Updated 4 years ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- A CALDERA plugin☆63Updated 7 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆19Updated 2 years ago
- All in one - Malware + Analysis by Cylance☆10Updated 5 years ago
- Presentations from the CX Security Labs team☆32Updated 6 months ago
- Links to malware-related YARA rules☆14Updated last year
- Research project on heterogeneous IoT protocols modelling☆54Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆31Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆36Updated 2 months ago
- ☆13Updated last year