D4-project / passive-ssh
A Passive SSH back-end and scanner.
☆102Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for passive-ssh
- SNIcat☆125Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- D4 core software (server and sample sensor client)☆43Updated 11 months ago
- Automatically exported from code.google.com/p/nipper-ng☆66Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆28Updated 4 years ago
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆37Updated last week
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆258Updated last year
- Website crawler with YARA detection☆88Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 7 months ago
- ☆48Updated 7 months ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆138Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 8 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆207Updated 2 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year
- A CVE Heatmap Using CalPlot☆98Updated 3 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- A Go client for crobat☆23Updated 4 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆65Updated last year