Automatic attack detector and botnet classifier
☆28Jan 10, 2017Updated 9 years ago
Alternatives and similar repositories for BotHound
Users that are interested in BotHound are comparing it to the libraries listed below
Sorting:
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- 最近出現在影印店的病毒,會請大家幫忙挖礦 XD☆13Jun 20, 2016Updated 9 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- ☆15Mar 2, 2014Updated 11 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- ☆16Jan 29, 2016Updated 10 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- The website for FOSS Responders☆19Dec 2, 2025Updated 2 months ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- repository for development of visuals in accordance with the sunlight style guide☆27Jul 8, 2015Updated 10 years ago
- Ansible recipes for deployment of secure communications systems☆44Jan 21, 2018Updated 8 years ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Tool for A/B testing of path transparency to certain features in the Internet☆22Dec 28, 2024Updated last year
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- Apache Traffic Server Plugin performing various anti-DDoS measures☆36Oct 11, 2021Updated 4 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- ☆36Mar 2, 2022Updated 3 years ago
- The paste analyzer☆27Mar 19, 2021Updated 4 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆27Jul 18, 2017Updated 8 years ago