Pure-Python library for computing fuzzy hashes (ssdeep)
☆48Updated this week
Alternatives and similar repositories for ppdeep
Users that are interested in ppdeep are comparing it to the libraries listed below
Sorting:
- Domain Blocklist☆10Aug 21, 2024Updated last year
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated last month
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- heres my attempt at a control flow (cflow) cleaner, don't expect much from it☆15Dec 9, 2022Updated 3 years ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- A host-based IDS and network monitoring system (My graduation project)☆26Jul 6, 2021Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Passive DHCP fingerprinting implementation☆52Jul 12, 2016Updated 9 years ago
- Embed .zip files into images.☆26Jul 20, 2024Updated last year
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- ☆30Mar 3, 2025Updated 11 months ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- xResolver - Xbox Resolver and PSN Resolver with Gamertag IP Puller☆17Apr 27, 2021Updated 4 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- SSL certificate parsing for humans☆36Jun 30, 2024Updated last year
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Hans - IP over ICMP☆50Dec 11, 2013Updated 12 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Architecture of Twint scrapper which allow download tweets on many instances without api restrictions☆10Nov 30, 2020Updated 5 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- The Code implements the following: => Storing a file => Retrieving a file. Key Technologies used are PHP,HTML 5☆12Feb 5, 2023Updated 3 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago