☆29May 4, 2016Updated 9 years ago
Alternatives and similar repositories for hsn2-bundle
Users that are interested in hsn2-bundle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Git Repo and Filesystem credential scanner☆18Sep 8, 2017Updated 8 years ago
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 5 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Jun 18, 2019Updated 6 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- ☆13Dec 16, 2022Updated 3 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Open source code for MobiPurpose project☆13Mar 25, 2025Updated last year
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- 淘宝秒杀脚本☆13Oct 23, 2024Updated last year
- A collection of demisto tools☆20Dec 29, 2025Updated 2 months ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Data files for use with hubble☆16Apr 21, 2020Updated 5 years ago
- 安卓逆向教程、技巧、工具、文档。☆16Mar 23, 2024Updated 2 years ago
- messing around writing reversing tools in clojure☆15Nov 9, 2017Updated 8 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- 针对iOS应用程序的漏洞检测☆11Dec 4, 2018Updated 7 years ago
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Webapplication Honeypot☆15May 12, 2013Updated 12 years ago
- iOS Automation Framework iOS Touch Simulation Library☆14Nov 18, 2024Updated last year
- This program detects all present and future ransomware in Windows file shares or local drives for Windows file servers. I created this w…☆19Dec 18, 2023Updated 2 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago