unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"
☆29Apr 29, 2016Updated 9 years ago
Alternatives and similar repositories for inetsim
Users that are interested in inetsim are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Checks WiFi network Connection and Restarts it if is down☆29Apr 4, 2013Updated 12 years ago
- ☆10Jul 27, 2016Updated 9 years ago
- ☆21Apr 30, 2020Updated 5 years ago
- STIX Tools & Scripts☆47Dec 2, 2013Updated 12 years ago
- Script which expands a FS to the size of the SDcard minus a bit☆22Jul 17, 2024Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- ECP5 FPGA DEV BOARD☆10Apr 19, 2021Updated 4 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- ☆17Jun 2, 2015Updated 10 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 5 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- DEPRECATED: A Node.js daemon that interfaces with Vault and Warden to provide a secure method to deliver secrets to servers in the cloud.☆14Dec 19, 2023Updated 2 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- ☆11May 31, 2019Updated 6 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- Default new blog project template for Middleman☆12Oct 28, 2020Updated 5 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Aug 19, 2022Updated 3 years ago
- Code and data for the CCS'19 paper "Watching You Watch: The Tracking Ecosystem of Over-the-TopTV Streaming Devices"☆13Dec 14, 2019Updated 6 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- GitHub Action to generate GitHub Advanced Security (GHAS) metrics report☆18Feb 1, 2025Updated last year
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Dockerized version of INetSim☆20Apr 24, 2023Updated 2 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year