StefanGrimminck / zgrab2-configurations
A repository for possible zgrab2 configurations
☆25Updated 2 years ago
Alternatives and similar repositories for zgrab2-configurations:
Users that are interested in zgrab2-configurations are comparing it to the libraries listed below
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆67Updated last month
- Website crawler with YARA detection☆88Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆27Updated 11 months ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆18Updated last week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆74Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Updated last week
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 9 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- Do bulk whois lookups and get alerted on domains of interest.☆24Updated 6 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated last month
- ☆41Updated 2 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- Look into EDR events from network☆23Updated 10 months ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 7 years ago
- Golang implementation of PyMISP-feedgenerator☆16Updated 2 years ago
- ☆41Updated 10 months ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆38Updated 2 years ago
- Active C2 IoCs☆97Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Static Token And Credential Scanner☆96Updated last year
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆24Updated 2 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆51Updated last month
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago