Credential Phish Analysis and Automation
☆99Aug 22, 2018Updated 7 years ago
Alternatives and similar repositories for DATA
Users that are interested in DATA are comparing it to the libraries listed below
Sorting:
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 3 months ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Nov 4, 2022Updated 3 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- BGP Hijack Detection☆117Feb 14, 2018Updated 8 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368May 21, 2024Updated last year
- ☆11Aug 11, 2014Updated 11 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Malware/IOC ingestion and processing engine☆110Nov 20, 2018Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆269Mar 7, 2021Updated 5 years ago