yarasploitYaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (-18.42%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+1744.74%)
GanetiGaneti is a virtual machine cluster management tool built on top of existing virtualization technologies such as Xen or KVM and other open source software.
Stars: ✭ 290 (+663.16%)
yara-validatorValidates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-2.63%)
skycloud-base🔥springcloud脚手架,配置中心(apollo/nacos) 注册中心(consul/nacos) 分布式事物(seata) 调用链(skywalking) 日志(ELK)监控(prometheus与grafana) 等,适合学习与快速开发使用
Stars: ✭ 80 (+110.53%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+610.53%)
React VirtualizedReact components for efficiently rendering large lists and tabular data
Stars: ✭ 22,963 (+60328.95%)
ansible-rolesLibrary of Ansible plugins and roles for deploying various services.
Stars: ✭ 14 (-63.16%)
BinjadockAn extendable, tabbed, dockable UI widget plugin for BinaryNinja https://binary.ninja.
Stars: ✭ 34 (-10.53%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+147.37%)
yara-rulesYara rules written by me, for free use.
Stars: ✭ 13 (-65.79%)
JustlogJustLog brings logging on iOS to the next level. It supports console, file and remote Logstash logging via TCP socket with no effort. Support for logz.io available.
Stars: ✭ 439 (+1055.26%)
YaraSharpC# wrapper around the Yara pattern matching library
Stars: ✭ 29 (-23.68%)
elk-examplesExample collection for Elk
Stars: ✭ 29 (-23.68%)
Elk搭建ELK日志分析平台。
Stars: ✭ 688 (+1710.53%)
Threatpursuit VmThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 814 (+2042.11%)
Opsops - build and run nanos unikernels
Stars: ✭ 552 (+1352.63%)
OzAutomated installation for guest images
Stars: ✭ 286 (+652.63%)
react-virtual-listA tiny virtualization list component(gzipped 6KB), supports dynamic height: https://dwqs.github.io/react-virtual-list/
Stars: ✭ 45 (+18.42%)
ps-srum-huntingPowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting
Stars: ✭ 16 (-57.89%)
factoringFactor numbers using a quantum computer
Stars: ✭ 30 (-21.05%)
deflekindex and API RBAC for Elasticsearch and Kibana via reverse proxy. DEPRECATED
Stars: ✭ 13 (-65.79%)
PevThe PE file analysis toolkit
Stars: ✭ 422 (+1010.53%)
honeycomb本项目用于验证一系列开源项目
Stars: ✭ 13 (-65.79%)
Fake-Sandbox-ArtifactsThis script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
Stars: ✭ 138 (+263.16%)
blogr-pvePuppet provisioning of HA failover/cluster environment implemented in Proxmox Virtual Environment and Linux boxes.
Stars: ✭ 28 (-26.32%)
control-paneClonOS WEB control panel (CBSD WEB UI)
Stars: ✭ 112 (+194.74%)
rhqRecon Hunt Queries
Stars: ✭ 66 (+73.68%)
elk-dashboard-v5-dockerMy production setup for the latest version of ELK stack running in a compose, displaying a basic -but powerfull- security and performance dashboard.
Stars: ✭ 25 (-34.21%)
Cc Oci RuntimeOCI (Open Containers Initiative) compatible runtime for Intel® Architecture
Stars: ✭ 418 (+1000%)
vic-uivSphere Integrated Containers Plug-In for vSphere Client provides information about your VIC setup and allows you to deploy VCHs directly from the vSphere Client.
Stars: ✭ 23 (-39.47%)
JAlgoArenaJAlgoArena programming contest platform
Stars: ✭ 32 (-15.79%)
ahvAllows Apple Silicon Hypervisor Framework interactions in a safe manner
Stars: ✭ 50 (+31.58%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+1678.95%)
bonomenBONOMEN - Hunt for Malware Critical Process Impersonation
Stars: ✭ 42 (+10.53%)
docker-elkELK Stack on Docker
Stars: ✭ 43 (+13.16%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+976.32%)
WeDefend⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Stars: ✭ 23 (-39.47%)
pybinaryedgePython 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-57.89%)
NemuModern Hypervisor for the Cloud
Stars: ✭ 887 (+2234.21%)
blogretrohunblog
Stars: ✭ 46 (+21.05%)
hermit-playgroundA playground to build C/C++/Go/Fortran applications on top of RustyHermit
Stars: ✭ 13 (-65.79%)
esdc-ceDanube Cloud :: Community Edition
Stars: ✭ 101 (+165.79%)
Dex OracleA pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (+947.37%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-52.63%)
apooxmlGenerate YARA rules for OOXML documents.
Stars: ✭ 34 (-10.53%)
PersonNotes个人笔记集中营,快糙猛的形式记录技术性Notes .. 📚☕️⌨️🎧
Stars: ✭ 61 (+60.53%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+1644.74%)
S2ANS2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (+84.21%)
MeerkatA collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (+647.37%)
detectionDetection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (+84.21%)
VagrantVagrant is a tool for building and distributing development environments.
Stars: ✭ 23,108 (+60710.53%)
Yara RulesRepository of YARA rules made by McAfee ATR Team
Stars: ✭ 283 (+644.74%)