A Python command line argument to object parsing library for command line application development
☆14Mar 23, 2016Updated 9 years ago
Alternatives and similar repositories for commandlines
Users that are interested in commandlines are comparing it to the libraries listed below
Sorting:
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Tiny Honeypot☆19Aug 9, 2013Updated 12 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- A command-line tool to filter text and highlight the output.☆21Aug 27, 2019Updated 6 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Any other spell-checkers out there? Let's call this one the bait.☆17Sep 23, 2015Updated 10 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Mar 8, 2016Updated 9 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Monitor datasets, gets alerts when something happens☆209Dec 6, 2018Updated 7 years ago
- LD_PRELOAD hack to redirect connections to other ports☆44Dec 3, 2015Updated 10 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- A framework for creating web API bindings in Python☆15Sep 3, 2011Updated 14 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- Home to the ActorTrackr source code☆30Aug 31, 2017Updated 8 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- An Exploration into Graph Databases☆28Oct 7, 2015Updated 10 years ago
- ☆59Aug 22, 2022Updated 3 years ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Oct 29, 2019Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆65Nov 5, 2015Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Emoji for the BA shell – use emoji as Environment Variables☆25Feb 29, 2016Updated 10 years ago