Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+109.09%)
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+69.7%)
denoised-smoothingProvably defending pretrained classifiers including the Azure, Google, AWS, and Clarifai APIs
Stars: ✭ 82 (+148.48%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+433.33%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (+0%)
haaukinsA Highly Accessible and Automated Virtualization Platform for Security Education
Stars: ✭ 148 (+348.48%)
ADLESAutomated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (-15.15%)
know your ipKnow Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (-51.52%)
ioc-scannerSearch a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (-6.06%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+81.82%)
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-30.3%)
gitavscanGit Anti-Virus Scan Action - Detect trojans, viruses, malware & other malicious threats.
Stars: ✭ 23 (-30.3%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+266.67%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+363.64%)
MOSPA collaborative platform for creating, editing and sharing JSON objects.
Stars: ✭ 72 (+118.18%)
Malware-DetectionDeep Learning Based Android Malware Detection Framework
Stars: ✭ 29 (-12.12%)
procedural-advmlTask-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)
Stars: ✭ 47 (+42.42%)
antimalwareappAnti-malware for Android using machine learning
Stars: ✭ 206 (+524.24%)
PassLockPassLock is a medium-security password manager that encrypts passwords using Advanced Encryption Standards (AES)
Stars: ✭ 44 (+33.33%)
linkedin-employee-scraperExtract all employees from LinkedIn. Especially useful for companies with thousands of employees.
Stars: ✭ 16 (-51.52%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+3.03%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+2624.24%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-45.45%)
TheRoadOfSO学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+766.67%)
Rat-Hunterdetect trojans by easy way 🛡️
Stars: ✭ 24 (-27.27%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-18.18%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (+9.09%)
assemblylineAssemblyLine 4 - File triage and malware analysis
Stars: ✭ 69 (+109.09%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-24.24%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1948.48%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-6.06%)
RobustTrees[ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples
Stars: ✭ 62 (+87.88%)
cuc-ns网络安全课本
Stars: ✭ 42 (+27.27%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+709.09%)
recommendations-for-engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+145.45%)
generative adversaryCode for the unrestricted adversarial examples paper (NeurIPS 2018)
Stars: ✭ 58 (+75.76%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+139.39%)
WeDefend⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Stars: ✭ 23 (-30.3%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-21.21%)
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (+3.03%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+230.3%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (+36.36%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+1184.85%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+84.85%)
rs4aRandomized Smoothing of All Shapes and Sizes (ICML 2020).
Stars: ✭ 47 (+42.42%)
my-cybersecurity-notesThese are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-60.61%)
binary viewerA binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust
Stars: ✭ 55 (+66.67%)
ArmorLibEasily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (-39.39%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-51.52%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+815.15%)