Workbench: A scalable python framework for security research and development teams.
☆92Oct 25, 2019Updated 6 years ago
Alternatives and similar repositories for old-workbench-archived
Users that are interested in old-workbench-archived are comparing it to the libraries listed below
Sorting:
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Network visualizer tool built using Processing☆24Jun 23, 2021Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Mar 13, 2017Updated 9 years ago
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Dec 8, 2022Updated 3 years ago
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 7 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A taxonomy and dictionary of malware behaviors.☆43Aug 20, 2019Updated 6 years ago
- Network Security Monitoring Framework☆49Oct 19, 2012Updated 13 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Jul 10, 2019Updated 6 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- Data Hacking Project☆783Mar 5, 2019Updated 7 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago