citizenlab / badtrafficLinks
Supporting data for BAD TRAFFIC Citizen Lab report.
☆23Updated 7 years ago
Alternatives and similar repositories for badtraffic
Users that are interested in badtraffic are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Cryptowall Tooling & Information☆37Updated 9 years ago
- SystemInspector is a script to pull a majority of the security-relevant files and settings from a system.☆18Updated 7 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆42Updated 9 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆95Updated 10 months ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- ☆68Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- VirusTotal tools☆92Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- REST API based malware repository (abandoned)☆107Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- A streamlined way to create STIX documents!☆32Updated 11 years ago
- ☆58Updated 11 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- API to use Cymru services☆27Updated 12 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Dragon Sandbox☆79Updated 12 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- DEPRECATED USE v3!☆59Updated 10 years ago