Aki92 / Thug-DistributedLinks
It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed among them to process and get back the results to the main server.
☆24Updated 10 years ago
Alternatives and similar repositories for Thug-Distributed
Users that are interested in Thug-Distributed are comparing it to the libraries listed below
Sorting:
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 6 years ago
- Powershell tool to download malware samples.☆12Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- ☆16Updated 10 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- YAPDNS☆39Updated 10 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 7 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆105Updated 9 years ago
- Extract information from MISP via the API☆16Updated 9 years ago
- Why hunt when you can seine?☆21Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Updated 10 years ago
- A scalable framework for binary analysis in a containered environment.☆13Updated 6 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- Python libary to normalize Yara signatures☆19Updated 5 years ago
- Small scripts for doing repeatable tasks☆25Updated 3 years ago
- Extract useful information from a Twitter account.☆35Updated 12 years ago