fkie-cad / socbedView external linksLinks
A Self-Contained Open-Source Cyberattack Experimentation Testbed
☆43Jun 5, 2025Updated 8 months ago
Alternatives and similar repositories for socbed
Users that are interested in socbed are comparing it to the libraries listed below
Sorting:
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Jul 19, 2021Updated 4 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Diary of a reverse-engineer blog☆20Oct 2, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- ☆21Nov 7, 2023Updated 2 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 9 months ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Oct 13, 2025Updated 4 months ago
- Packing detection tool for PE files☆27Dec 1, 2024Updated last year
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆25Apr 8, 2019Updated 6 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Apr 16, 2021Updated 4 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 6 months ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Oct 13, 2018Updated 7 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 4 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Decode HikVision device export QR codes.☆16May 5, 2025Updated 9 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆45Oct 1, 2025Updated 4 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆96Jan 13, 2026Updated last month
- POC of sudo password stealer☆36Feb 10, 2021Updated 5 years ago