cylance / NMAP-ClusterLinks
Clustering NMAP XML results to help make sense of large scan results.
☆33Updated 2 years ago
Alternatives and similar repositories for NMAP-Cluster
Users that are interested in NMAP-Cluster are comparing it to the libraries listed below
Sorting:
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Some IR notes☆73Updated 8 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆87Updated 7 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- A warehouse for your malware☆134Updated 12 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- ☆22Updated 7 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Updated 7 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- ☆50Updated 9 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- ☆25Updated 8 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- ☆53Updated 4 years ago