citizenlab / spyware-scanLinks
☆36Updated 10 years ago
Alternatives and similar repositories for spyware-scan
Users that are interested in spyware-scan are comparing it to the libraries listed below
Sorting:
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Collection of data about URL filtering in various countries☆44Updated 9 years ago
- This is a prototype system that uses Hadoop to process hard drive images.☆52Updated 13 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- Network white noise collector☆19Updated 9 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- Plugins written for CVE-Search☆27Updated 4 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- eSentire additions to the nmap network scanner☆14Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 8 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- A curated list of tools for incident response☆34Updated last year
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- An advanced memory forensics framework☆25Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Network Security Monitoring Framework☆48Updated 13 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 4 years ago