edgecase1 / inetsim
unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"
☆27Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for inetsim
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- C# User Simulation☆33Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- ☆22Updated 3 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- ☆48Updated 4 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated last year
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- Yara rules to be used with the Burp Yara-Scanner extension☆44Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated 11 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- The Multiplatform Linux Sandbox☆15Updated 10 months ago
- ☆42Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- ☆36Updated 5 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆25Updated 6 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 4 years ago
- Use Markov Chains to obfuscate data as other data☆50Updated 8 years ago
- ☆23Updated 4 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 5 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last month