dirtbags / fluffyLinks
Tools for Network Archaeology (internet protocol analysis)
☆29Updated 2 months ago
Alternatives and similar repositories for fluffy
Users that are interested in fluffy are comparing it to the libraries listed below
Sorting:
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- Oil Pumpjack: open source materials to create your own oil pumpjack managed by an Arduino☆35Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- CLI tool to analyze PE files☆89Updated last year
- SightingDB is a database for Sightings☆22Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Frontend for MalShare.com☆17Updated 3 months ago
- Data related to the SANS Internet Storm Center☆13Updated 2 months ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- ☆52Updated 7 years ago
- Tools to assist in forensicating docker☆85Updated 8 months ago
- Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆87Updated 6 years ago
- ☆14Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- ☆42Updated last month
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- ☆22Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 weeks ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago