Aki92 / Thug-DistributedLinks
It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed among them to process and get back the results to the main server.
☆24Updated 9 years ago
Alternatives and similar repositories for Thug-Distributed
Users that are interested in Thug-Distributed are comparing it to the libraries listed below
Sorting:
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- API Tools☆27Updated 9 years ago
- ☆16Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- A scalable framework for binary analysis in a containered environment.☆13Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Updated 4 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆9Updated 9 years ago
- Volatility Plugins☆21Updated 10 years ago
- python web scraping☆9Updated 10 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Extract information from MISP via the API☆15Updated 8 years ago