THP Forensic Challenges
☆23Jul 28, 2023Updated 2 years ago
Alternatives and similar repositories for forensic_challenges
Users that are interested in forensic_challenges are comparing it to the libraries listed below
Sorting:
- Collection of port scans of the North Korean IPv4 subnets from different vps☆17Nov 25, 2025Updated 3 months ago
- Checkpot Honeypot Checker☆27Aug 13, 2018Updated 7 years ago
- ☆17Sep 4, 2021Updated 4 years ago
- A honeypot for malware that propagates via USB storage devices☆103Mar 24, 2015Updated 10 years ago
- ☆49Apr 22, 2013Updated 12 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Simple Automated Powershell Keylogger☆23May 21, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- A deliberately simple Django app for managing IT inventory☆13Jul 14, 2016Updated 9 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- ☆10Aug 18, 2025Updated 6 months ago
- ☆12Jan 9, 2019Updated 7 years ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- 8085 emulation library implemented in C++☆13May 2, 2023Updated 2 years ago
- An analysis of the released data on FinCrime Files transactions as depicted on SARs.☆10Nov 26, 2020Updated 5 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Dec 14, 2025Updated 2 months ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- This repo is used for sharing AI productivity tools & workflows within Xebia to empower employees in using AI in a responsible way making…☆12Dec 25, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- Python SDK and CLI utility for searchcode.com.☆10Feb 3, 2026Updated last month
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- A new PagerDuty agent.☆11Sep 15, 2025Updated 5 months ago
- An automatic speaker recognition system built from digital signal processing tools, Vector Quantization and LBG algorithm☆11May 24, 2021Updated 4 years ago
- ☆10May 29, 2023Updated 2 years ago
- ☆10Jan 31, 2021Updated 5 years ago