Series of scripts to generate fake logs for use in cyber exercises.
☆18Oct 25, 2015Updated 10 years ago
Alternatives and similar repositories for logfile-generators
Users that are interested in logfile-generators are comparing it to the libraries listed below
Sorting:
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- OSSEC HIDS - Sucuri Fork☆11Feb 12, 2021Updated 5 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- Linux integrity monitoring for CentOS/RHEL☆13May 13, 2020Updated 5 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Spider for searching Onions for other Onions☆10Oct 11, 2015Updated 10 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Inspired by Netmiko & Netdev to make scripts run much faster☆12Jun 6, 2019Updated 6 years ago
- A logging handler for Splunk. Lets you send information to Splunk directly from your Python code.☆23Jul 28, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Tortazo for TOR☆36May 27, 2015Updated 10 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- WebSocket curl - The WebSocket CLI for developers☆26May 10, 2021Updated 4 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago