SubtleScope / logfile-generators
Series of scripts to generate fake logs for use in cyber exercises.
☆17Updated 9 years ago
Alternatives and similar repositories for logfile-generators
Users that are interested in logfile-generators are comparing it to the libraries listed below
Sorting:
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- AYY LMAO☆22Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- ☆48Updated 9 years ago
- Automatically scans for malicious proxies.☆29Updated 10 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- API Tools☆27Updated 9 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆37Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Incident Response Scripts☆30Updated 5 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago