ch3k1 / squidmagicLinks
analyze a web-based network traffic πΆ to detect central command and control servers
β80Updated 7 years ago
Alternatives and similar repositories for squidmagic
Users that are interested in squidmagic are comparing it to the libraries listed below
Sorting:
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.β66Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.β7Updated 6 years ago
- Terminal Ip Lookup Toolβ56Updated 11 years ago
- Analyse SQL injection attempts in web server logsβ82Updated 8 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcodeβ72Updated 9 years ago
- Tools for harvesting email addresses for phishing attacks |β85Updated 9 years ago
- AutoBrowser Screenshotβ49Updated 8 years ago
- Smoking Linux Every Day!β54Updated 5 years ago
- A simple and effective phpmyadmin honeypotβ67Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.β42Updated 8 years ago
- Simple reverse ICMP shellβ41Updated 12 years ago
- uses keywords from alert logs to send SMSβ24Updated 9 years ago
- Honeypot (Dionaea and kippo) setup scriptβ84Updated 8 years ago
- A fully featured malware scanner for Linux desktops and servers.β68Updated 3 years ago
- Modular tool to test exfiltration techniques.β37Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.ioβ41Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.β43Updated 10 years ago
- VirusTotal toolsβ91Updated 4 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resβ¦β45Updated 6 years ago
- Check if a IP is from tor or is a malicious proxyβ56Updated 4 years ago
- pwning & info gathering via user browserβ39Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysisβ42Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC credsβ168Updated 10 years ago
- Simple IP Information Tools for Reputation Data Analysisβ23Updated 6 years ago
- Cross Distribution Exploit Testingβ28Updated 9 years ago
- Search exploits in multiple exploit databases!β81Updated 4 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect punyβ¦β79Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypotsβ62Updated 9 years ago
- Hardening Tool for *nixesβ50Updated 8 years ago