Artefacts from various retefe campaigns
☆10Mar 9, 2019Updated 6 years ago
Alternatives and similar repositories for retefe
Users that are interested in retefe are comparing it to the libraries listed below
Sorting:
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- "What if I tossed small pox into a room filled with sprinters after filling their water cups with red bull."☆33Feb 9, 2026Updated 3 weeks ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Fork of Dnmap (http://dnmap.sourceforge.net/)☆22Jul 14, 2022Updated 3 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Tracks runtime instruction execution in Linux programs☆36Aug 25, 2013Updated 12 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- An Exploration into Graph Databases☆28Oct 7, 2015Updated 10 years ago
- Little python tool to use the Chinese Remainder theorem attack on RSA under precise conditions.☆23Nov 19, 2016Updated 9 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Leak File Analyzer☆63Nov 12, 2017Updated 8 years ago
- Mass DNS resolution tool☆37Jan 1, 2026Updated 2 months ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆32Apr 20, 2018Updated 7 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Dump messages and media info from list of Telegram channels to CSV and monitor for changes☆31Jan 21, 2020Updated 6 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- OSoMe API mashups☆11Jan 29, 2019Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Ruby gem for WOVN backend on Rack☆10Oct 17, 2025Updated 4 months ago
- Adds a jPOS sampler to JMeter to communicate with banking services☆13Oct 13, 2020Updated 5 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- ☆11Jan 28, 2019Updated 7 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago