Anti-Honeypot Demo (obsolete)
☆18Jul 24, 2017Updated 8 years ago
Alternatives and similar repositories for TC2017
Users that are interested in TC2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Oct 23, 2015Updated 10 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- ☆68Aug 1, 2017Updated 8 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- A parser/timeline creator for auditd logs.☆16Aug 5, 2014Updated 11 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Sample slash command server for Mattermost (Python)☆14Mar 1, 2016Updated 10 years ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- ssl-cipher-suite enum is a Perl script to enumerate supported SSL cipher suites supported by network services (principally HTTPS)☆30Apr 5, 2021Updated 4 years ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- A wireshark dissector for Mode-S aircraft transmissions☆14May 25, 2016Updated 9 years ago
- Linux Application Firewall☆59May 23, 2020Updated 5 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Offline CVE Search utility.☆17Jul 17, 2017Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Nov 3, 2025Updated 4 months ago
- WoW client modification to record client and server packets☆12Jan 7, 2016Updated 10 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Plugin designed to expedite your 3D printing process. It smartly reduces unnecessary Auto Bed Leveling (ABL) actions☆12Jan 1, 2026Updated 2 months ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- BSidesCBR CTF docker compose files☆66Jun 4, 2020Updated 5 years ago
- Automatic firewall rule orchestator.☆82Sep 28, 2017Updated 8 years ago