edgecase1 / inetsim
unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"
☆28Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for inetsim
- isodump - ISO dump utility☆39Updated 5 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- ☆22Updated 3 years ago
- Radare2 Metadata Extraction to Elasticsearch☆21Updated 6 months ago
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆21Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 4 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- ☆29Updated 6 years ago
- ☆15Updated 2 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Public repository for Red Canary Research☆34Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆37Updated 4 months ago
- The Multiplatform Linux Sandbox☆15Updated 11 months ago
- Standardized Malware Analysis Tool☆51Updated 3 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆25Updated 6 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆12Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- Cybersecurity Incidents Mind Maps☆32Updated 3 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated last year
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago