☆37Jul 10, 2015Updated 10 years ago
Alternatives and similar repositories for blackhole
Users that are interested in blackhole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- encoding format, library, and utilities for passive DNS data☆27Mar 29, 2024Updated last year
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- Some tools to monitor BillGates CnC servers☆137Apr 14, 2014Updated 11 years ago
- Malware Sinkhole List in various formats☆104Jul 6, 2022Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Jun 20, 2018Updated 7 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- Home of the dionaea honeypot☆794Aug 1, 2024Updated last year
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- The Multiplatform Linux Sandbox☆266Jan 3, 2022Updated 4 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- parse strace log☆12Oct 16, 2019Updated 6 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Advanced Honeypot framework.☆1,296Oct 9, 2023Updated 2 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.☆30May 25, 2017Updated 8 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- TR-069 Honeypot☆131Mar 16, 2016Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- A honeypot for malware that propagates via USB storage devices☆103Mar 24, 2015Updated 11 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A framework for streamlining the capture of PANDA execution traces.☆57Jun 16, 2020Updated 5 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Jul 12, 2022Updated 3 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago