Repo for autosnort scripts.
☆156Oct 11, 2020Updated 5 years ago
Alternatives and similar repositories for Autosnort
Users that are interested in Autosnort are comparing it to the libraries listed below
Sorting:
- first commit☆23Feb 16, 2026Updated 2 weeks ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- ☆49Mar 31, 2016Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- VirusTotal tools☆91Nov 12, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Mar 6, 2018Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- A Wordpress Honeypot☆185Feb 7, 2023Updated 3 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- Honeypot Intelligence with Splunk☆256Oct 18, 2018Updated 7 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- Modern Honey Network App for Splunk☆50Sep 30, 2019Updated 6 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Aug 28, 2015Updated 10 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆459Oct 16, 2023Updated 2 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago