honeynet / ghost-usb-honeypot
A honeypot for malware that propagates via USB storage devices
☆93Updated 9 years ago
Related projects: ⓘ
- ☆152Updated this week
- A warehouse for your malware☆131Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- A repository of tools and scripts related to malware analysis☆242Updated 8 years ago
- ☆76Updated this week
- Spam Honeypot with Intelligent Virtual Analyzer☆131Updated 4 months ago
- A short and small memory forensics helper.☆52Updated 6 years ago
- pastebin.com Content Monitoring Tool☆192Updated 11 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆77Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆112Updated 5 years ago
- Honeypot (Dionaea and kippo) setup script☆81Updated 7 years ago
- Dragon Sandbox☆77Updated 11 years ago
- Rogue AP killer☆86Updated 6 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆125Updated 11 months ago
- VirusTotal tools☆90Updated 3 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆42Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆40Updated 7 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆85Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆109Updated 6 years ago
- a low-interaction honeypot☆92Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆33Updated 4 years ago
- Differential Analysis of Malware in Memory☆209Updated 7 years ago
- Transparent network tap☆115Updated 8 years ago
- Process HTTP Pcaps With YARA☆99Updated 11 years ago
- Yara rules for malware families seen as part of targeted threats project☆131Updated 7 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆44Updated 2 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆65Updated 9 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆92Updated 9 years ago
- ☆36Updated this week