endgameinc / homoglyph
☆30Updated 6 years ago
Alternatives and similar repositories for homoglyph:
Users that are interested in homoglyph are comparing it to the libraries listed below
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Notebook collection☆10Updated 6 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- ☆14Updated 6 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Updated 7 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Opening CobaltStrike to a wider world☆8Updated 7 years ago
- ssdeep based clustering tool☆14Updated 9 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- ☆12Updated 7 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 7 years ago
- ☆9Updated 6 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Hosted analyzers built for Grapl☆13Updated 2 years ago
- Splunk integration with MISP☆12Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago