fbb-git / stealth
Stealth is a File Integrity scanner performing its work in a stealthy way.
☆12Updated 6 years ago
Alternatives and similar repositories for stealth:
Users that are interested in stealth are comparing it to the libraries listed below
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 4 months ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- ☆24Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- Probing a network for Ubiquiti devices and parsing responses☆18Updated 8 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 9 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Ansible configurations for distributed MultiScanner installations☆14Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- first commit☆20Updated last year
- MISP - Ansible installation script☆22Updated 6 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆3Updated last year
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- ☆12Updated 5 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 6 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- ☆22Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year