YakindanEgitim / malwarezLinks
Malware visualization on earth map
☆40Updated 10 years ago
Alternatives and similar repositories for malwarez
Users that are interested in malwarez are comparing it to the libraries listed below
Sorting:
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- YAPDNS☆39Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- python web scraping☆9Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A collection of shellcodes☆69Updated 13 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Network Security Monitoring Framework☆47Updated 12 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- REST API based malware repository (abandoned)☆107Updated 10 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago