Headless AI agent for deterministic reverse engineering.
-
Updated
Dec 9, 2025 - Python
Headless AI agent for deterministic reverse engineering.
Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨
An SSH metadata analyser used to showcase a timing-based attack on the protocol.
Repository of tools, YARA rules, and code-snippets from Stairwell's research team.
A public repository of quality research on cyber attack techniques. This is the backend for the Technique Research Report (TRR) Library.
Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.
The Elastic Security Research team produces public-facing content, in the way of summary blogs, detailed releases, and artifacts; articulating both adversary campaign activities and threat detection steps that can be leveraged to frustrate adversary goals.
It provides a simple way to interact with the Odin API and access various services related to cybersecurity, certificates, and more
Advanced Living Off the Land (LotL) tactics, tools, and abuse techniques for red teams, defenders, and cyber researchers. Stealth over payload.
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.
senhasegura Identity Threat Labs is a premier threat intelligence center specializing in predictive analysis of identity-focused attack vectors. Using reverse engineering, malware analysis, and threat intelligence, our lab identifies emerging threats and provides actionable reports to help organizations strengthen defenses and mitigate risks.
A set of API's to catalog sets of saved-searches for the purpose of contextualizing research efforts & results. Batteries not included.
Frontend for the TRR Library.
Curated list of APT group trackers, malware family indexes, naming maps, threat actor reporting, and public intelligence sources.
PoC for CVE-2025-48384 - but with HTTPS instead
Cybersecurity Project: Scanning process relationships
Threat Research & Malware Reverse Engineering
Sophos NIS2 Compliance Board to assess an institutions Cybersecurity Maturity Level
Artefact conçu pour déplacer la surface d'action vers la représentation opérationnelle d'un système défensif. Pas d'exploitation, pas de persistance. L'espace cognitif comme terrain. Ce qui cesse d'être observé pendant la qualification est l'espace dans lequel il opère.
Add a description, image, and links to the threat-research topic page so that developers can more easily learn about it.
To associate your repository with the threat-research topic, visit your repo's landing page and select "manage topics."