dirtbags / fluffyLinks
Tools for Network Archaeology (internet protocol analysis)
☆29Updated last year
Alternatives and similar repositories for fluffy
Users that are interested in fluffy are comparing it to the libraries listed below
Sorting:
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆14Updated 7 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- ☆52Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Tools to assist in forensicating docker☆84Updated 5 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Frontend for MalShare.com☆17Updated 2 weeks ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- SightingDB is a database for Sightings☆22Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- CLI tool to analyze PE files☆88Updated 11 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated this week
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- ☆54Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- ☆25Updated 2 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 6 years ago
- ☆22Updated 4 years ago