G4lB1t / TC2017View external linksLinks
Anti-Honeypot Demo (obsolete)
☆18Jul 24, 2017Updated 8 years ago
Alternatives and similar repositories for TC2017
Users that are interested in TC2017 are comparing it to the libraries listed below
Sorting:
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Useful commands for infosec☆28Feb 13, 2023Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- Sample slash command server for Mattermost (Python)☆14Mar 1, 2016Updated 9 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- A wireshark dissector for Mode-S aircraft transmissions☆14May 25, 2016Updated 9 years ago
- Scapy hands-on at #GreHack16☆15Nov 19, 2016Updated 9 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Hunting IOCs all day every day...☆87Sep 26, 2023Updated 2 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 3 months ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- ☆29Feb 16, 2021Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Linux Application Firewall☆58May 23, 2020Updated 5 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Nov 25, 2020Updated 5 years ago
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- ssl-cipher-suite enum is a Perl script to enumerate supported SSL cipher suites supported by network services (principally HTTPS)☆30Apr 5, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Make Windows LNK file with python (pylnk)☆66Jun 4, 2016Updated 9 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 8 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- VirusTotal tools☆92Nov 12, 2020Updated 5 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- BSidesCBR CTF docker compose files☆66Jun 4, 2020Updated 5 years ago