Web Interface Portal & Security Threat Engine for REMnux
☆24Aug 1, 2016Updated 9 years ago
Alternatives and similar repositories for WIPSTER
Users that are interested in WIPSTER are comparing it to the libraries listed below
Sorting:
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- Dll injector POC for new handle stealing technique☆21Oct 8, 2017Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Static DLL Patching and Hooking System☆25Sep 30, 2015Updated 10 years ago
- Decodes PlugX traffic and encrypted/compressed artifacts☆39Apr 29, 2013Updated 12 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Dec 2, 2025Updated 3 months ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Alienvault Labs Projects Random Stuff☆79Sep 24, 2013Updated 12 years ago
- Generate STIX XML from OpenIOC XML☆95Oct 18, 2018Updated 7 years ago
- Magento module integrating Apache Solr☆24Apr 19, 2015Updated 10 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 3 months ago
- Extract files from captured TCP sessions. Support live streams and pcap files.☆49Feb 14, 2013Updated 13 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Split testing for Magento with Google Analytics☆19Sep 22, 2014Updated 11 years ago
- ☆12Jul 7, 2014Updated 11 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Proof of Concept code of the Shoplift code☆41Oct 4, 2021Updated 4 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Jul 14, 2015Updated 10 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago