grimm-co / mmeLinks
Man-in-the-middle made easy!
☆15Updated 5 years ago
Alternatives and similar repositories for mme
Users that are interested in mme are comparing it to the libraries listed below
Sorting:
- Presentation Slides and Resources☆16Updated last year
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- ☆20Updated last year
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated last year
- ☆22Updated 4 years ago
- Browser Detection and Response (Browser Extension)☆11Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- C# User Simulation☆32Updated 2 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 4 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- ☆19Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- ☆16Updated 5 months ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆25Updated 7 years ago
- Data related to the SANS Internet Storm Center☆10Updated 6 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago