ccied / tripwire
Public crawler and data from Tripwire: Inferring Internet Site Compromise
☆96Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for tripwire
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆252Updated last year
- Repository for penetration testing tools☆37Updated 4 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆116Updated 6 years ago
- Vulnerability scanner based on vulners.com audit API☆200Updated 6 years ago
- A webshell framework for penetration testers.☆295Updated 7 months ago
- Windows Remote Post Breach Tool via Telegram☆132Updated 6 years ago
- CERT Tapioca for MITM network analysis☆181Updated 6 months ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆235Updated last year
- Fancy Bear Source Code☆260Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 7 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆195Updated 3 months ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 7 years ago
- DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API☆47Updated 6 years ago
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆260Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 7 years ago