0xyd / Sneak
Sneak is URL transfer tool based on Tor and Curl.
☆14Updated 6 years ago
Alternatives and similar repositories for Sneak:
Users that are interested in Sneak are comparing it to the libraries listed below
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 6 years ago
- ☆53Updated 4 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆29Updated 4 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- Incident Response Scripts☆30Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- Automated phishing attacks against WiFi networks☆9Updated 9 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆48Updated 4 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆61Updated last month
- Maltego Transforms, Machines and other extentions☆44Updated 9 years ago
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- VirusTotal Intelligence Search☆35Updated 4 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆24Updated 4 years ago
- Invisible Watermarks with Space Characters in ASCII Files☆21Updated 6 years ago
- PowerShell based Live Response tool☆12Updated 9 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 6 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- Yara rules for quick reverse engineering of malware.☆19Updated 9 years ago