Tim--- / mirai-tracker
Various tools to track the Mirai botnet
☆20Updated 8 years ago
Alternatives and similar repositories for mirai-tracker:
Users that are interested in mirai-tracker are comparing it to the libraries listed below
- Various snippets created during malware analysis☆22Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- ☆22Updated 7 years ago
- ☆16Updated 10 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Some rules, scripts of some use to us☆9Updated 3 months ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Tool for dropping malware from EK☆41Updated 6 years ago
- A script to track malware IOCs with OSINT on Twitter.☆52Updated 8 months ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 7 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- EmPyre Web Interface☆12Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆37Updated 8 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago