CYB3RMX / BadPigLinks
A compilation of snort rules for detecting malware traffic.
☆15Updated 4 years ago
Alternatives and similar repositories for BadPig
Users that are interested in BadPig are comparing it to the libraries listed below
Sorting:
- An super lightweight utility for creating bootable USB drives.☆22Updated 5 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆16Updated 4 years ago
- Some malware samples or suspicious files I found and their reports.☆37Updated 4 years ago
- A simple arp spoof script written with python☆14Updated 5 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Updated 3 months ago
- nmap nse script for scan a whole country☆13Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- IoT device scanner with CVE database and many features.☆15Updated 6 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16Updated 8 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Updated 2 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- Low Interaction Mobile Honeypot☆96Updated 6 months ago
- delosNmap | Nmap Script☆38Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- ☆24Updated last year
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Updated 4 years ago
- URL fingerprinting made easy☆89Updated last year
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Updated 4 years ago
- I use all of scripts in this repository daily and schedule them to control my systems. Also, it includes all of my penetration tests scri…☆30Updated 3 years ago
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆46Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆56Updated last year
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Updated 4 years ago