A Python command line argument to object parsing library for command line application development
☆14Mar 23, 2016Updated 9 years ago
Alternatives and similar repositories for commandlines
Users that are interested in commandlines are comparing it to the libraries listed below
Sorting:
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- Tiny Honeypot☆19Aug 9, 2013Updated 12 years ago
- A framework for creating web API bindings in Python☆15Sep 3, 2011Updated 14 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Monitor datasets, gets alerts when something happens☆209Dec 6, 2018Updated 7 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Any other spell-checkers out there? Let's call this one the bait.☆17Sep 23, 2015Updated 10 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- LD_PRELOAD hack to redirect connections to other ports☆44Dec 3, 2015Updated 10 years ago
- Starting point for Cycle.js projects (MIT)☆12Sep 21, 2015Updated 10 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Mar 8, 2016Updated 10 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- Analysis related to article on FOIA Online Database.☆11Feb 2, 2017Updated 9 years ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- JSON API implementation using bookshelf models.☆12Sep 8, 2015Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- detects whether the browser can auto-play audio☆14Jun 23, 2016Updated 9 years ago
- Unofficial Python wrapper for Rdio's web services API. Complete with models for all Rdio objects and OAuth support.☆17Jul 18, 2014Updated 11 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Oct 29, 2019Updated 6 years ago
- Secure Password Generator☆49Dec 9, 2022Updated 3 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago