Anti-Honeypot Demo (obsolete)
☆18Jul 24, 2017Updated 8 years ago
Alternatives and similar repositories for TC2017
Users that are interested in TC2017 are comparing it to the libraries listed below
Sorting:
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- ☆68Aug 1, 2017Updated 8 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Real-time web-server visualization using OpenGL and a force directed layout☆46Mar 26, 2008Updated 17 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 4 months ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Nov 25, 2020Updated 5 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ssl-cipher-suite enum is a Perl script to enumerate supported SSL cipher suites supported by network services (principally HTTPS)☆30Apr 5, 2021Updated 4 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- VirusTotal tools☆91Nov 12, 2020Updated 5 years ago
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 7 years ago
- Python static blog generator☆42Nov 1, 2016Updated 9 years ago
- ☆10Apr 20, 2022Updated 3 years ago