dirtbags / fluffy
Tools for Network Archaeology (internet protocol analysis)
☆29Updated last year
Alternatives and similar repositories for fluffy:
Users that are interested in fluffy are comparing it to the libraries listed below
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- ☆53Updated 4 years ago
- ☆14Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- XOR Key Extractor☆50Updated 8 months ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆19Updated 2 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Site for IWS book content☆18Updated 6 years ago
- SightingDB is a database for Sightings☆22Updated last year
- CyCAT.org taxonomies☆14Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- For storing of the volumes☆4Updated 5 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- ☆24Updated 2 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- Simple tool to find the yara matches on a file☆1Updated 6 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago