endgameinc / homoglyph
☆30Updated 6 years ago
Alternatives and similar repositories for homoglyph:
Users that are interested in homoglyph are comparing it to the libraries listed below
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- Notebook collection☆10Updated 5 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 6 years ago
- Tripod is a tool/ML model for computing latent representations for large sequences☆16Updated 9 months ago
- My notes on various topics☆64Updated last year
- Generate bulk YARA rules from YAML input☆22Updated 4 years ago
- Opening CobaltStrike to a wider world☆8Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆51Updated 8 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 6 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- ☆14Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago
- ☆12Updated 7 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- ☆25Updated 3 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 8 months ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago