Skip to content
View pandaof's full-sized avatar

Block or report pandaof

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

⭐AI-driven public opinion & trend monitor with multi-platform aggregation, RSS, and smart alerts.🎯 告别信息过载,你的 AI 舆情监控助手与热点筛选工具!聚合多平台热点 + RSS 订阅,支持关键词精准筛选。AI 智能筛选新闻 + AI 翻译 + AI 分析简报直推手机,也支持接入 MCP 架构…

Python 51,697 23,146 Updated Apr 12, 2026

Schutz vor Fakeshops, Werbung, Tracking und anderen Angriffen aus dem Internet

Python 1,676 254 Updated Apr 15, 2026

Distributed malware processing framework based on Python, Redis and S3.

Python 466 51 Updated Apr 9, 2026

Get started with building Fullstack Agents using Gemini 2.5 and LangGraph

Jupyter Notebook 18,091 3,069 Updated Apr 10, 2026

This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals to enhance threat detection and improve incident respons…

Python 121 23 Updated Sep 17, 2025

ScopeSentry-Cyberspace mapping, subdomain enumeration, port scanning, sensitive information discovery, vulnerability scanning, distributed nodes

Go 1,488 211 Updated Apr 1, 2026

A tool to analyze malicious LNK payloads.

Python 3 1 Updated Mar 29, 2025

Zeek-Formatted Threat Intelligence Feeds

Zeek 394 49 Updated Apr 15, 2026

A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.

Python 58 5 Updated May 24, 2021

Dynamic unpacker based on PE-sieve

C 806 77 Updated Apr 14, 2026

Aims to identify sleeping beacons

C 664 63 Updated Jan 25, 2026

MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning

Jupyter Notebook 65 10 Updated Aug 26, 2025

Configuration Extractors for Malware

Python 125 19 Updated Apr 23, 2025

Scalable RL solution for advanced reasoning of language models

Python 1,844 111 Updated Mar 18, 2025

Loki - Simple IOC and YARA Scanner

Python 3,742 622 Updated Jan 12, 2026

🚀🤖 Crawl4AI: Open-source LLM Friendly Web Crawler & Scraper. Don't be shy, join here: https://discord.gg/jP8KfhDhyN

Python 64,063 6,567 Updated Apr 11, 2026

Extracting IoC data from eMail

Python 141 32 Updated Jan 5, 2026

An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and groups.

Python 106 14 Updated Apr 21, 2024

FLARE Team's Binary Navigator

Python 313 44 Updated Feb 23, 2026

A tool that automates regex generation for the x86 and x86-64 instruction sets

Python 75 3 Updated Apr 18, 2024

Generator of regular expressions

Python 14 1 Updated Apr 11, 2025

Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware's final stage configuration.

C# 151 4 Updated Sep 21, 2024

DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, fi…

Python 342 66 Updated Feb 7, 2025

🦆 Malduck is your ducky companion in malware analysis journeys

Python 350 36 Updated Jun 22, 2025

Malware Configuration And Payload Extraction

Python 3,130 557 Updated Apr 15, 2026

Elastic Malware Benchmark for Empowering Researchers

Jupyter Notebook 1,146 311 Updated Nov 22, 2024

Repository to provide files related to our blog articles.

Python 16 Updated May 26, 2025

Elastic Security detection content for Endpoint

YARA 1,406 158 Updated Apr 13, 2026

Detection in the form of Yara, Snort and ClamAV signatures.

YARA 251 42 Updated Nov 1, 2024
Next