It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed among them to process and get back the results to the main server.
☆24Jan 5, 2016Updated 10 years ago
Alternatives and similar repositories for Thug-Distributed
Users that are interested in Thug-Distributed are comparing it to the libraries listed below
Sorting:
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- meterpreter☆11Mar 31, 2018Updated 7 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆198Jan 21, 2016Updated 10 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Oct 25, 2019Updated 6 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Some crypto tools I've written☆33May 18, 2015Updated 10 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- Query network abuse contacts for a given ip address on abuse-contacts.abusix.zone☆20Nov 13, 2020Updated 5 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Spam trap management☆23Jun 18, 2024Updated last year
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Sep 3, 2017Updated 8 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- ☆37May 21, 2014Updated 11 years ago
- Tool to help analyze PDF files☆192May 22, 2014Updated 11 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago