dirtbags / fluffyLinks
Tools for Network Archaeology (internet protocol analysis)
☆29Updated last year
Alternatives and similar repositories for fluffy
Users that are interested in fluffy are comparing it to the libraries listed below
Sorting:
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- ☆51Updated 6 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 8 years ago
- Client library for the mwdb service by CERT Polska.☆40Updated 8 months ago
- pcapdj - dispatch pcap files☆46Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- CyCAT.org taxonomies☆15Updated 4 years ago
- ☆14Updated 7 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Frontend for MalShare.com☆16Updated this week
- ☆53Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Tools to assist in forensicating docker☆84Updated 4 months ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- SightingDB is a database for Sightings☆22Updated 2 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- CLI tool to analyze PE files☆87Updated 9 months ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆20Updated 3 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago