citizenlab / badtraffic
Supporting data for BAD TRAFFIC Citizen Lab report.
☆23Updated 7 years ago
Alternatives and similar repositories for badtraffic:
Users that are interested in badtraffic are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- A curated list of tools for incident response☆29Updated last year
- intel amt honeypot☆18Updated 7 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- API to use Cymru services☆27Updated 11 years ago
- See here:☆42Updated 12 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- ☆12Updated 8 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- eSentire additions to the nmap network scanner☆13Updated 9 years ago
- ☆27Updated 8 years ago
- ☆13Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆27Updated 9 years ago
- ☆36Updated 12 years ago