There are no reviews yet. Be the first to send feedback to the community and the maintainers!
CyBot
Open Source Threat Intelligence Chat Botmacos-arm64-emulation
A guide for emulating macOS arm64e on an x86-based host.IntroductionToMachineLearningForSecurityPros
Example code for our book Introduction to Artificial Intelligence for Security ProfessionalsSMBTrap
Tools developed to test the Redirect to SMB issuemitmcanary
Tool/service to detect Man in the Middle attacks with Canary Requestswinapi-deobfuscation
Towards Generic Deobfuscation of Windows API CallsMarkovObfuscate
Use Markov Chains to obfuscate data as other dataAblation
Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual calls, reveal interesting code, exclude heavily traversed regions, identify untested or undocumented features, visually diff samples, or perform root cause analysis simply by running samples. My favourite however is the virtual call resolution with fully interactive x-refs. It's simple, elegant, and disassembled C++ reads like C! It helps me time and time again.NMAP-Cluster
Clustering NMAP XML results to help make sense of large scan results.GetNETGUIDs
Extract GUIDs from .NET assembliespython-cyapi
This Library provides python bindings to interact with the Cylance API.IDPanel
Identify botnet panels with Ensembled Decision Treesrogers
Python command-line tool that uses nearest neighbor search methods for malware similarity analysisGeneralizedConvolutionalNeuralNets
Generalized convolutional neural network algorithm for use with point cloud data with arbitrary spatial features.improving-malware-detection-accuracy-by-extracting-icon-information
Code for the paper "Improving Malware Detection Accuracy by Extracting Icon Information"GoogleAuthDotNet
A dot net based Google Authenticator Client - suitable for use in a windows environmentREcon2016
BBS-Era Exploitation for Fun and Anachronismlazy-stochastic-principal-component-analysis
Code for the paper "Lazy stochastic principal component analysis"perturbed-sequence-model
Prangster
Black-Box Assessment of Pseudorandom AlgorithmsIOCs
Love Open Source and this site? Check out how you can help us