bcaseiro / malwaresimulatorLinks
Malware Simulator - Pretend a malware infection by creating a text file into several locations on the local system and also in the network.
☆26Updated 7 years ago
Alternatives and similar repositories for malwaresimulator
Users that are interested in malwaresimulator are comparing it to the libraries listed below
Sorting:
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- Tools for the Computer Incident Response Team☆144Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 5 months ago
- ☆73Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- automate your MISP installs☆68Updated 5 years ago
- PowerShell No Agent Hunting☆109Updated 7 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆187Updated last year
- Security Onion Elastic Stack☆46Updated 4 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Cyber Intel Management☆49Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆179Updated 5 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- ☆49Updated 5 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- A toolkit for Security Researchers☆127Updated 6 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆138Updated 5 months ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Simple Microsoft Windows sessions event logs visualization☆152Updated 3 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 7 years ago
- Main Build directory☆179Updated 6 years ago