DEPRECATED USE v3!
☆59Sep 8, 2015Updated 10 years ago
Alternatives and similar repositories for cif-v1
Users that are interested in cif-v1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- Sample Dockerfile and Nginx configuration to run nginx + ngx_pagespeed.☆15Jan 23, 2014Updated 12 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- Web based Manager for Yara Rules☆58Mar 9, 2020Updated 6 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- ransomware_begone☆42Mar 15, 2016Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Network Block Device Server for windows with a DFIR/forensic focus.☆96Mar 31, 2017Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Contains documentation on suggested API design and best practices.☆14Mar 16, 2017Updated 9 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- This is a LEGACY repo head to☆134Mar 20, 2024Updated 2 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- ☆13Jul 2, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- Static analysis tools for Microsoft Office Open XML files and documents☆73Oct 13, 2017Updated 8 years ago
- Asynchronous Cloudant / CouchDB interface for Python☆35May 4, 2016Updated 9 years ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33May 24, 2016Updated 9 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- eXpandable Open Research on Cyber Information Security Management☆23May 10, 2020Updated 5 years ago