7h3rAm / rudra
A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.
☆15Updated 7 years ago
Alternatives and similar repositories for rudra:
Users that are interested in rudra are comparing it to the libraries listed below
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated last year
- Plugins written for CVE-Search☆25Updated 3 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- ☆15Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 weeks ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Notebook collection☆10Updated 5 years ago
- Python bindings for Yeti's API☆18Updated last year
- Passive Network Audit Framework☆32Updated 6 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Opening CobaltStrike to a wider world☆8Updated 7 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 5 months ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Websocket based egress tester☆20Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- first commit☆20Updated last year
- Six Degrees of Domain Admin☆15Updated 7 years ago