CYB3RMX / BadPig
A compilation of snort rules for detecting malware traffic.
☆15Updated 4 years ago
Alternatives and similar repositories for BadPig:
Users that are interested in BadPig are comparing it to the libraries listed below
- An super lightweight utility for creating bootable USB drives.☆23Updated 4 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Updated 4 years ago
- Some malware samples or suspicious files I found and their reports.☆37Updated 3 years ago
- IoT device scanner with CVE database and many features.☆14Updated 5 years ago
- A simple arp spoof script written with python☆16Updated 5 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- delosNmap | Nmap Script☆40Updated 2 years ago
- Simple And Fast Subdomain Take Over Checker☆9Updated 6 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆16Updated 3 years ago
- Next generation cyber security research and testing software.☆15Updated 4 years ago
- URLScan Go API client☆7Updated 4 years ago
- Cloudflare Bypass Script☆22Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Simple directory brute-force tool written with python.☆40Updated 4 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 3 years ago
- Backdoor, keylogger, mac changer, mitm, netscan, sniffer☆14Updated 8 months ago
- In-depth Attack Surface Mapping and Asset Discovery☆12Updated 5 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 11 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆21Updated 2 years ago
- ☆12Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Hash Cracker, MD5 database & Brute Force Tools☆15Updated 3 years ago
- nmap nse script for scan a whole country☆14Updated 2 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 7 years ago
- an ancient irc botnet☆12Updated 10 years ago
- Nexus of Android banking Trojans☆15Updated last year
- ☆33Updated 3 months ago