CyFI-Lab-Public / ECHOLinks
☆48Updated last year
Alternatives and similar repositories for ECHO
Users that are interested in ECHO are comparing it to the libraries listed below
Sorting:
- Make your keepass 2.x more secure.☆60Updated 2 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated 2 months ago
- ☆101Updated 2 years ago
- Analyze assets authorization, who has access to what and how☆76Updated 11 months ago
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces…☆128Updated this week
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆977Updated this week
- Aranya user library, daemon, and policy code☆194Updated this week
- Deep Linux runtime visibility meets Wireshark☆302Updated 2 months ago
- ☆269Updated 2 years ago
- Knowledge base on cybercriminal concealment techniques☆95Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- ☆53Updated 3 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated 2 months ago
- ☆83Updated 2 months ago
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆117Updated last year
- Add a layer of active defense to your cloud applications.☆103Updated this week
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆233Updated 7 months ago
- Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.☆109Updated 5 months ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆432Updated this week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 7 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆583Updated this week
- List of past and future infosec related events.☆169Updated last week
- Create and publish PiRogue images☆23Updated 9 months ago
- Nova-Proximity is a MCP and Agent Skills security scanner powered with NOVA☆277Updated last week
- A project to rapidly extract all email addresses from any files in a given path☆204Updated last month
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage☆135Updated 3 months ago
- A Cyber Range to learn hacking (both attacking & defending) techniques locally in your computer☆125Updated 2 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆101Updated last month
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago