dod-cyber-crime-center / kordesiiView external linksLinks
☆16Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for kordesii
Users that are interested in kordesii are comparing it to the libraries listed below
Sorting:
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Community modules for FAME☆66Dec 16, 2025Updated 2 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆339Feb 7, 2025Updated last year
- Query network abuse contacts for a given ip address on abuse-contacts.abusix.zone☆20Nov 13, 2020Updated 5 years ago
- A virtual PDF analysis framework☆16Jan 31, 2014Updated 12 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- A plugin extensible Slack bot.☆16Dec 26, 2022Updated 3 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24May 4, 2016Updated 9 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Jul 30, 2013Updated 12 years ago
- A collection of advent of code solutions.☆10Dec 28, 2015Updated 10 years ago
- Copy and Paste standard library (CPSTL) is a repository with a collection of data structure and algorithms in many different languages☆13Feb 15, 2025Updated last year
- Dead simple JSON Formatter☆10Oct 21, 2016Updated 9 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Identifies music based on microphone input. By request of someone in r/learnprogramming.☆19Dec 8, 2012Updated 13 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Encodes data into printable Unicode characters.☆90May 2, 2025Updated 9 months ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- [DEPRECATED] You should use web3.py instead.☆10Nov 24, 2016Updated 9 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- run, monitor and closer remote SSH processes automatically☆12Oct 10, 2019Updated 6 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- EmerCoin SSH PKI and distributed ACL☆15Mar 4, 2017Updated 8 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- MySQL's login path file reader☆12Nov 15, 2024Updated last year
- A java library to output logs for debugging. It is available in Java 8 or later.☆11Jul 26, 2025Updated 6 months ago
- ☆13Oct 10, 2018Updated 7 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago