7h3rAm / rudraLinks
A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.
☆15Updated 8 years ago
Alternatives and similar repositories for rudra
Users that are interested in rudra are comparing it to the libraries listed below
Sorting:
- Plugins written for CVE-Search☆26Updated 4 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Malware/IOC ingestion and processing engine☆107Updated 7 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- A warehouse for your malware☆133Updated 12 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Bro PCAP Processing and Tagging API☆28Updated 8 years ago
- ☆28Updated 9 years ago
- AYY LMAO☆22Updated 9 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 10 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 7 years ago
- ☆50Updated 9 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago