honeynet / DICOMHawkLinks
A DICOM honeypot for detecting and logging unauthorized access attempts
☆48Updated 3 weeks ago
Alternatives and similar repositories for DICOMHawk
Users that are interested in DICOMHawk are comparing it to the libraries listed below
Sorting:
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated 2 years ago
- C2 Active Scanner☆59Updated last year
- Tor onion address lookup☆59Updated last month
- ☆10Updated last year
- Graphical map of known Advanced Persistent Threats☆62Updated last week
- IOCs and notes related to malware☆27Updated 7 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Updated 2 months ago
- Repository of tools and resources for analyzing Docker containers☆72Updated 2 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆92Updated this week
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆57Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Security Content for the PEAK Threat Hunting Framework☆40Updated last year
- Detection rule validation☆40Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- A home for detection content developed by the delivr.to team☆73Updated 6 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 8 months ago
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 11 months ago
- ☆20Updated 2 weeks ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 5 months ago