foospidy / sigsci-sounds
Listen to the soothing sounds of attacks and anomalies detected by the Signal Sciences web protection platform.
☆10Updated 6 years ago
Alternatives and similar repositories for sigsci-sounds:
Users that are interested in sigsci-sounds are comparing it to the libraries listed below
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 8 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 8 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- A Go API client for HackerOne (api.hackerone.com)☆42Updated 8 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆27Updated 7 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Host files with DNS☆32Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Updated 10 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A tool for calculating necessary SQL Server permissions☆24Updated 10 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago