anafsah's repositories
autotools-examples
Several examples of configure.ac and Makefile.am files
avclass
AVClass malware labeling tool
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources.
cvss-calculator
A Java library for calculating CVSSv2 and CVSSv3 scores and vectors
CyberMonitor-APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
DLT-Security-Framework
DLT-Security-Framework | blockchain vulnerabilities CVE
Eset-malware-ioc
Indicators of Compromises (IOC) of our various investigations
h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
IoCs
Sophos-originated indicators-of-compromise from published reports
kmax
A collection of analysis tools for Kconfig and Kbuild constraints.
LinuxFlaw
This repo records all the vulnerabilities of linux software I have reproduced in my local workspace
malicious_ip_addresses
These are the IP addresses of the most active C2/Botnets/Zombies/Scanners in European Cyber Space
McAffee-IOCs
Repository containing IOCs, CSV and MISP JSON from our blogs
ML-For-Beginners
12 weeks, 24 lessons, classic Machine Learning for all
Neo23x0-signature-base
Signature base for Neo23x0's scanner tools
nvme-qemu
A detailed guide for setting up NVMeOF in qemu, debugging using gdb and tracing packets via wireshark
PAN-iocs
Indicators from Unit 42 Public Reports
pandare-panda
Platform for Architecture-Neutral Dynamic Analysis
PCLocator
Locating presence conditions in variable software systems
ProIntegrate-IOCs-Daily
Recent IOCs, moved from Pastebin
pycparser
:snake: Complete C99 parser in pure Python
pycvss3
Python API for the CVSS v3
stampram-maltrail
Malicious traffic detection system
sysmon-config
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.