honeynet / DICOMHawkLinks
A DICOM honeypot for detecting and logging unauthorized access attempts
☆47Updated 2 weeks ago
Alternatives and similar repositories for DICOMHawk
Users that are interested in DICOMHawk are comparing it to the libraries listed below
Sorting:
- Graphical map of known Advanced Persistent Threats☆62Updated this week
- Tor onion address lookup☆59Updated 3 weeks ago
- C2 Active Scanner☆59Updated last year
- Signature based honeypot detector tool written in Golang☆107Updated 10 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Python based CLI for MalwareBazaar☆39Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated 2 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆44Updated 2 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- An Adaptive Misuse Detection System☆46Updated last year
- Thor Artifacts for Velociraptor☆19Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated 3 months ago
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆46Updated 3 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆91Updated 3 months ago
- Can you pay the ransom in your country?☆14Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆75Updated last month
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆13Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Updated 5 months ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 8 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated 2 years ago
- ☆66Updated 3 years ago