Stars
⭐AI-driven public opinion & trend monitor with multi-platform aggregation, RSS, and smart alerts.🎯 告别信息过载,你的 AI 舆情监控助手与热点筛选工具!聚合多平台热点 + RSS 订阅,支持关键词精准筛选。AI 智能筛选新闻 + AI 翻译 + AI 分析简报直推手机,也支持接入 MCP 架构…
Schutz vor Fakeshops, Werbung, Tracking und anderen Angriffen aus dem Internet
Distributed malware processing framework based on Python, Redis and S3.
Get started with building Fullstack Agents using Gemini 2.5 and LangGraph
This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals to enhance threat detection and improve incident respons…
ScopeSentry-Cyberspace mapping, subdomain enumeration, port scanning, sensitive information discovery, vulnerability scanning, distributed nodes
A tool to analyze malicious LNK payloads.
Zeek-Formatted Threat Intelligence Feeds
A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning
Configuration Extractors for Malware
Scalable RL solution for advanced reasoning of language models
🚀🤖 Crawl4AI: Open-source LLM Friendly Web Crawler & Scraper. Don't be shy, join here: https://discord.gg/jP8KfhDhyN
An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and groups.
A tool that automates regex generation for the x86 and x86-64 instruction sets
Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware's final stage configuration.
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, fi…
🦆 Malduck is your ducky companion in malware analysis journeys
Malware Configuration And Payload Extraction
Elastic Malware Benchmark for Empowering Researchers
Repository to provide files related to our blog articles.
Elastic Security detection content for Endpoint
Detection in the form of Yara, Snort and ClamAV signatures.