CYB3RMX / BadPig
A compilation of snort rules for detecting malware traffic.
☆15Updated 4 years ago
Alternatives and similar repositories for BadPig:
Users that are interested in BadPig are comparing it to the libraries listed below
- An super lightweight utility for creating bootable USB drives.☆23Updated 4 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Updated 3 years ago
- Some malware samples or suspicious files I found and their reports.☆37Updated 3 years ago
- A simple arp spoof script written with python☆16Updated 4 years ago
- IoT device scanner with CVE database and many features.☆14Updated 5 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated 10 months ago
- Simple directory brute-force tool written with python.☆39Updated 4 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 2 years ago
- generate yara-androguard report on your local and scan☆12Updated 5 years ago
- Python Module for Parsing & Reverse Engineering Mach-O Executables.☆17Updated 11 months ago
- Network security analysis tool with nmap scripts for termux ...☆44Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 5 months ago
- In-depth Attack Surface Mapping and Asset Discovery☆13Updated 4 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆16Updated 3 years ago
- ☆12Updated 8 months ago
- Malware hashes for open source projects.☆76Updated 3 weeks ago
- ☆18Updated 2 years ago
- URLScan Go API client☆7Updated 4 years ago
- Simple And Fast Subdomain Take Over Checker☆8Updated 6 years ago
- ☆15Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 7 years ago
- Cloudflare Bypass Script☆23Updated 5 years ago
- IDOR testing tool. Coded during Lunizz live stream.☆31Updated 4 years ago
- Pentesting Pratic Notes☆15Updated 3 years ago
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆20Updated 2 years ago
- Parola ile saklanan steganography sorularında resmin içinde saklı flag dosyasını aldığı wordList ile bulan tool☆9Updated 8 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago