Coder Social home page Coder Social logo

threatintel-c's Projects

blueborne icon blueborne

PoC scripts demonstrating the BlueBorne vulnerabilities

bluespawn icon bluespawn

Windows-based Active Defense and EDR tool to empower Blue Teams

cat icon cat

CAT 作为服务端项目基础组件,提供了 Java, C/C++, Node.js, Python, Go 等多语言客户端,已经在美团点评的基础架构中间件框架(MVC框架,RPC框架,数据库框架,缓存框架等,消息队列,配置系统等)深度集成,为美团点评各业务线提供系统丰富的性能指标、健康状况、实时告警等。

cboard icon cboard

An easy to use, self-service open BI reporting and BI dashboard platform.

chaosblade icon chaosblade

An easy to use and powerful chaos engineering experiment toolkit.(阿里巴巴开源的一款简单易用、功能强大的混沌实验注入工具)

community-id-spec icon community-id-spec

An open standard for hashing network flows into identifiers, a.k.a "community IDs".

confluo icon confluo

Real-time Monitoring and Analysis of Data Streams

contractfuzzer icon contractfuzzer

The Ethereum Smart Contract Fuzzer for Security Vulnerability Detection (ASE 2018)

cve icon cve

漏洞源代码分析,以及相应的poc

cyberthreatintel icon cyberthreatintel

Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups

dayu icon dayu

一款开源指纹识别工具。

decaf icon decaf

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.

deeptraffic icon deeptraffic

Deep Learning models for network traffic classification

detectionlab icon detectionlab

Automate the creation of a lab environment complete with security tooling and logging best practices

device-detector icon device-detector

The Universal Device Detection library will parse any User Agent and detect the browser, operating system, device used (desktop, tablet, mobile, tv, cars, console, etc.), brand and model.

digital-risk-analysis-on-gator-smart-watch icon digital-risk-analysis-on-gator-smart-watch

The aim of the project is to analyze the different ways of hacking possibilities on the smartwatch and create security measures. The "Impact & Probability" of vulnerability levels are ranked under high, medium, and low. The dataflow from user to gator servers is analyzed using the OBASHI method. I learned about (OBASHI, how to analyze the digital risks and security measures to be taken before the cyber attack, and Involvement son of actors) from this project.

dispatch icon dispatch

All of the ad-hoc things you're doing to manage incidents today, done for you, and much more!

dustcloud icon dustcloud

Xiaomi Smart Home Device Reverse Engineering and Hacking

edr-testing-script icon edr-testing-script

Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter/Invoke-DOSfuscation payloads

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.