dirtbags / fluffyLinks
Tools for Network Archaeology (internet protocol analysis)
☆29Updated last year
Alternatives and similar repositories for fluffy
Users that are interested in fluffy are comparing it to the libraries listed below
Sorting:
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- ☆52Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- ☆14Updated 7 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆19Updated last month
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- SightingDB is a database for Sightings☆22Updated 2 years ago
- Tools to assist in forensicating docker☆84Updated 5 months ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆20Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- ☆22Updated 4 years ago
- Command Line STDOUT Colorer☆30Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Frontend for MalShare.com☆17Updated 3 weeks ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Client library for the mwdb service by CERT Polska.☆40Updated 2 weeks ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 6 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago