CrowdStrike / TortillaLinks
☆299Updated 9 years ago
Alternatives and similar repositories for Tortilla
Users that are interested in Tortilla are comparing it to the libraries listed below
Sorting:
- Cisco Talos MBR Filter Driver☆344Updated 8 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆200Updated 9 years ago
- A collection of tools for dealing with TrickBot☆202Updated 8 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Panic button for protection against cold boot attacks☆146Updated 3 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆335Updated 5 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- A decryptor for Wanacry (you need the private key!)☆183Updated 8 years ago
- Malicious USB☆176Updated 2 years ago
- EternalRocks worm☆467Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- for the louise☆245Updated 5 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- ☆81Updated 8 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- Cross-platform, open-source shellbag parser☆160Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- DFF (Digital Forensics Framework) is a Forensics Framework coming with command line and graphical interfaces. DFF can be used to investig…☆297Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- VirusTotal tools☆92Updated 5 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 8 years ago
- ☆385Updated 13 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- A repository of tools and scripts related to malware analysis☆252Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 6 years ago