7h3rAm / rudraLinks
A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.
☆15Updated 7 years ago
Alternatives and similar repositories for rudra
Users that are interested in rudra are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 6 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 9 months ago
- Plugins written for CVE-Search☆26Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- SANS Hunting on the Cheap☆35Updated 9 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 5 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- Websocket based egress tester☆20Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Public version of PDF X-RAY☆60Updated 13 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- ☆28Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago