It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed among them to process and get back the results to the main server.
☆24Jan 5, 2016Updated 10 years ago
Alternatives and similar repositories for Thug-Distributed
Users that are interested in Thug-Distributed are comparing it to the libraries listed below
Sorting:
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Oct 25, 2019Updated 6 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Query network abuse contacts for a given ip address on abuse-contacts.abusix.zone☆20Nov 13, 2020Updated 5 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- ☆16Dec 5, 2023Updated 2 years ago
- ☆15Feb 18, 2016Updated 10 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Mar 8, 2026Updated 2 weeks ago
- ☆17Dec 9, 2014Updated 11 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Some crypto tools I've written☆33May 18, 2015Updated 10 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- meterpreter☆11Mar 31, 2018Updated 7 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- ☆16Updated this week
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- ☆37May 21, 2014Updated 11 years ago
- ☆36Jun 1, 2015Updated 10 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- scoreserver web application for CTF(Capture The Flag)☆24Aug 3, 2022Updated 3 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago