THP Forensic Challenges
☆23Jul 28, 2023Updated 2 years ago
Alternatives and similar repositories for forensic_challenges
Users that are interested in forensic_challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A honeypot for malware that propagates via USB storage devices☆103Mar 24, 2015Updated 11 years ago
- Collection of port scans of the North Korean IPv4 subnets from different vps☆17Nov 25, 2025Updated 4 months ago
- Spam trap management☆24Jun 18, 2024Updated last year
- ☆17Sep 4, 2021Updated 4 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆14Mar 10, 2021Updated 5 years ago
- ☆49Apr 22, 2013Updated 12 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆10Aug 18, 2025Updated 7 months ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Android trojan streamer client jar☆17Sep 11, 2016Updated 9 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Simple Automated Powershell Keylogger☆23May 21, 2020Updated 5 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- ⚡️ Streaming torrent client for the web☆16Aug 7, 2019Updated 6 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Android trojan starter apk☆20Sep 15, 2016Updated 9 years ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- A native macOS GUI wrapper built on top of searchsploit CLI.☆15Mar 18, 2018Updated 8 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆16Sep 10, 2020Updated 5 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆19Sep 19, 2018Updated 7 years ago
- DHCP server that talks GRPC☆15Jul 8, 2017Updated 8 years ago
- Wifi/Ethernet network session hijacker based on Scapy☆21Mar 14, 2013Updated 13 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Doing the tutorial from Brandon Rhodes PyCon 2015☆16Jun 19, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- WiFi-Jammer/DoS toolset☆61Jun 8, 2020Updated 5 years ago
- Documentation for and implementations of the metaschema modeling language☆47Dec 4, 2025Updated 3 months ago
- ☆15Nov 25, 2021Updated 4 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Simulation of movement of a human character using forward and inverse kinematics☆14May 22, 2016Updated 9 years ago
- Base and recommended kernel configurations. The base configurations are enforced by the VTS and are modified to permit GrapheneOS changes…☆17Dec 4, 2025Updated 3 months ago
- A Starter Template for using Ably in your Netlify projects☆20Jul 19, 2023Updated 2 years ago