ccied / ugforum-analysisView external linksLinks
Tools for Automated Analysis of Cybercriminal Markets
☆51Jan 8, 2019Updated 7 years ago
Alternatives and similar repositories for ugforum-analysis
Users that are interested in ugforum-analysis are comparing it to the libraries listed below
Sorting:
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 11 years ago
- ART☆16Aug 4, 2017Updated 8 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 6 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- ☆14May 30, 2018Updated 7 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 7 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Jan 14, 2026Updated last month
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Jun 20, 2022Updated 3 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- ☆102Jul 18, 2019Updated 6 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- 35C3 Slides☆23Dec 29, 2018Updated 7 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- ☆16Jul 19, 2017Updated 8 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- ☆29May 4, 2016Updated 9 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆46May 2, 2019Updated 6 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- CERT Tapioca for MITM network analysis☆185May 15, 2024Updated last year
- ☆19Sep 2, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- ☆138Mar 20, 2019Updated 6 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year