AHMED ELSAYED @csgaee's repositories

detection-rules

Rules for Elastic Security's detection engine

Language:PythonLicense:NOASSERTIONStargazers:1Issues:0Issues:0

binary-study

a backup for binary analysis study

Language:CStargazers:0Issues:0Issues:0

cb-multios

DARPA Challenges Sets for Linux, Windows, and macOS

Language:CLicense:MITStargazers:0Issues:0Issues:0

csgaee.github.io

0xCSGAEE reverse engineering & malware analysis related Blog Posts

Language:JavaScriptLicense:UnlicenseStargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:0Issues:0

jupyter

Jupyter Notebooks for Cyber Threat Intelligence

Language:Jupyter NotebookLicense:GPL-3.0Stargazers:0Issues:0Issues:0

re-list

A list of open source reverse engineering tools with a focus on binary analysis

Stargazers:0Issues:0Issues:0

txt2stix

txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.

Language:PythonLicense:AGPL-3.0Stargazers:0Issues:0Issues:0

Virtuailor

IDAPython tool for creating automatic C++ virtual tables in IDA Pro

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0