SuperCowPowers / old-workbench-archivedView external linksLinks
Workbench: A scalable python framework for security research and development teams.
☆92Oct 25, 2019Updated 6 years ago
Alternatives and similar repositories for old-workbench-archived
Users that are interested in old-workbench-archived are comparing it to the libraries listed below
Sorting:
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Network visualizer tool built using Processing☆24Jun 23, 2021Updated 4 years ago
- Advices to look for malicious software on your devices☆17May 6, 2020Updated 5 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Commandline utility to interact with the Malpedia service☆22Dec 5, 2025Updated 2 months ago
- Notes relating to secure messaging☆19Jun 11, 2016Updated 9 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Data Hacking Project☆784Mar 5, 2019Updated 6 years ago
- A taxonomy and dictionary of malware behaviors.☆43Aug 20, 2019Updated 6 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- Malquarium - Modern Malware Repository☆47Updated this week
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- STIX Schema Development☆75Aug 1, 2018Updated 7 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Jan 13, 2025Updated last year
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 6 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago