PiRogueToolSuite / pirogue-os
OS image for the PiRogue based on Debian 12
☆154Updated 6 months ago
Alternatives and similar repositories for pirogue-os:
Users that are interested in pirogue-os are comparing it to the libraries listed below
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆254Updated last week
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆403Updated 4 months ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆41Updated 2 years ago
- List of past and future infosec related events.☆140Updated this week
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆181Updated last year
- Source of the project website☆25Updated this week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆137Updated 2 weeks ago
- ☆261Updated last year
- Uncover the full name of a target on Linkedin.☆156Updated 2 years ago
- A Passive SSH back-end and scanner.☆103Updated 7 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆176Updated last week
- Check if your provider is blocking you!☆104Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆154Updated 2 years ago
- eBPF Port Knocking Tool☆232Updated last year
- Notes and receipts (PCAPs) for TCP and ICMP Noise Storms☆49Updated 4 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Updated 3 years ago
- A "line-network" geolocation tool created for Bellingcat's September 2022 Hackathon: https://www.bellingcat.com/resources/2022/10/06/auto…☆118Updated last year
- Nmap Web Interface including XML parsing, maps and reports☆50Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- High signal information security sources Goggle.☆67Updated last year
- Private key usage verification☆421Updated last month
- ☆79Updated last year
- Data visualization for blue teams☆124Updated 2 years ago
- ☆516Updated 2 weeks ago
- Source code and examples for Antignis☆36Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Updated last month
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- An application to analyze the EML file☆276Updated this week