☆19Jul 24, 2021Updated 4 years ago
Alternatives and similar repositories for gone-phishing
Users that are interested in gone-phishing are comparing it to the libraries listed below
Sorting:
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Bringing DevOps to Forensics☆34Feb 4, 2015Updated 11 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆56Nov 25, 2020Updated 5 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Jan 12, 2017Updated 9 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Scripts for making Hubot a CND Sidekick