CYB3RMX / BadPigLinks
A compilation of snort rules for detecting malware traffic.
☆15Updated 4 years ago
Alternatives and similar repositories for BadPig
Users that are interested in BadPig are comparing it to the libraries listed below
Sorting:
- An super lightweight utility for creating bootable USB drives.☆23Updated 4 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Updated 4 years ago
- A simple arp spoof script written with python☆16Updated 5 years ago
- Some malware samples or suspicious files I found and their reports.☆39Updated 3 years ago
- IoT device scanner with CVE database and many features.☆14Updated 5 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- Next generation cyber security research and testing software.☆15Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- nmap nse script for scan a whole country☆14Updated 3 years ago
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆22Updated 2 years ago
- delosNmap | Nmap Script☆39Updated 2 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆41Updated 4 years ago
- SSH brute-force script created for HackTheBox☆17Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- A database for storing, querying and doing stats on credential leaks☆40Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 months ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 6 months ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 4 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- web application pentesting tools for docker☆18Updated 3 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago