Globally distributed honeypots and HoneyNets IOCs and file reversing
☆16Apr 22, 2024Updated last year
Alternatives and similar repositories for WOPR
Users that are interested in WOPR are comparing it to the libraries listed below
Sorting:
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- Meraki MX Logstash configurations☆16Jan 8, 2023Updated 3 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Updated this week
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- A pySigma wrapper to manage detection rules.☆45Feb 17, 2026Updated 2 weeks ago
- A modular framework designed to chain and automate security tests.☆44Jan 6, 2021Updated 5 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- ☆54Updated this week
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- TinyCircuits TinyDuino Processor Board, Model ASM2001☆22Aug 18, 2020Updated 5 years ago
- Index of Macchina boards for the Arduino IDE Board Manager.☆10May 8, 2019Updated 6 years ago
- Ads.txt crawler and parser based on IAB Ads.txt Specification Version 1.0.1 implemented in Golang☆12Sep 4, 2019Updated 6 years ago
- Browser-based packet viewer powered by Wireshark☆20Jul 28, 2025Updated 7 months ago
- A Vulnerablity Radar That Runs With GIthub Actions☆44Feb 27, 2026Updated last week
- Board files and example code for the EL Sequencer☆15Jun 27, 2025Updated 8 months ago