Firefly-Automation / FireflyLinks
Firefly Home Automation
☆21Updated 7 years ago
Alternatives and similar repositories for Firefly
Users that are interested in Firefly are comparing it to the libraries listed below
Sorting:
- Kvasir: Penetration Test Data Management☆430Updated 7 years ago
- ☆49Updated 9 years ago
- Tool for scanning Cisco router products over SSH☆55Updated 11 years ago
- A powerful and extensible wireless drop box☆267Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Updated 10 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 8 years ago
- Improvements of/over the original rule2alert☆56Updated 11 years ago
- Documentation for the GRR Rapid Reponse framework☆310Updated last year
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- Scoreboard for CTF Competitions☆27Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 9 years ago
- Duct Tape Command and Control!☆96Updated 6 months ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 10 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆41Updated 10 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Updated 2 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆105Updated 9 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- ☆64Updated 3 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆141Updated 9 years ago
- A python script used to parse the SAM registry hive.☆75Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- ☆111Updated 8 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 4 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- MultiAV scanner with Python and JSON API. Disclaimer: I don't maintain it any more.☆323Updated 4 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Updated 8 years ago