Penetrum-Security / PenneView external linksLinks
Penne is an opensource AV (anti-virus) developed by Penetrum LLC
☆24Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for Penne
Users that are interested in Penne are comparing it to the libraries listed below
Sorting:
- Side channel-based network measurement tools.☆15Sep 1, 2015Updated 10 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last week
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- NAT Slipstream attack code samples☆48Jun 28, 2021Updated 4 years ago
- Binary and Static Releases☆16Nov 18, 2025Updated 2 months ago
- ☆12Jan 12, 2023Updated 3 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Примеры для курса "Программирование в Windows"☆10Nov 28, 2021Updated 4 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- ☆16Dec 7, 2025Updated 2 months ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- ☆10Apr 10, 2024Updated last year
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated 3 weeks ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- PeopleScrap is used to gather information (OSINT) about people in a company☆11Jan 22, 2019Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- computational sociology of philosophy☆16May 9, 2016Updated 9 years ago
- A novel way of handling malicious requests within a Django application.☆15Aug 22, 2012Updated 13 years ago
- Rats sources☆10Feb 23, 2022Updated 3 years ago
- Sign JSON objects with ED25519 signatures☆12Sep 23, 2022Updated 3 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Annual info about co2 emissions per nation☆14Dec 6, 2024Updated last year
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago