☆13Dec 12, 2021Updated 4 years ago
Alternatives and similar repositories for georipe
Users that are interested in georipe are comparing it to the libraries listed below
Sorting:
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- mIRC art editor & tools (for EFnet #MiRCART)☆10Feb 13, 2026Updated 2 weeks ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- A fast implementation of mmap in Python☆14Jun 3, 2020Updated 5 years ago
- A Serverless tool to automate Grafana components Backup and Restore.☆12May 15, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆15Sep 4, 2024Updated last year
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- VLESS-XTLS-uTLS-REALITY setup script.☆10May 3, 2023Updated 2 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- MIDict (Multi-Index Dict) can be indexed by any "keys" or "values", suitable as a bidirectional/inverse dict or a multi-key/multi-value d…☆14May 19, 2016Updated 9 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 7 years ago
- Dante socks proxy + FreeRadius + DaloRadius + MySQL + phpMyAdmin☆10Aug 29, 2017Updated 8 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- The objective of this action is to wait the end of a workflow☆12May 12, 2023Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago