Aki92 / Thug-Distributed
It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed among them to process and get back the results to the main server.
☆24Updated 9 years ago
Alternatives and similar repositories for Thug-Distributed:
Users that are interested in Thug-Distributed are comparing it to the libraries listed below
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- API Tools☆27Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- ☆16Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- Why hunt when you can seine?☆21Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 4 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago
- Python libary to normalize Yara signatures☆19Updated 4 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- See here:☆42Updated 12 years ago
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago