honeynet / ghost-usb-honeypot
A honeypot for malware that propagates via USB storage devices
☆97Updated 9 years ago
Alternatives and similar repositories for ghost-usb-honeypot:
Users that are interested in ghost-usb-honeypot are comparing it to the libraries listed below
- Transparent network tap☆116Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 6 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- A repository of tools and scripts related to malware analysis☆246Updated 8 years ago
- Malware Repository Framework☆100Updated 6 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆80Updated 9 years ago
- VirusTotal tools☆90Updated 4 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆136Updated last month
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- pastebin.com Content Monitoring Tool☆193Updated 12 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆88Updated 9 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated 9 months ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Dragon Sandbox☆78Updated 11 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 7 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆66Updated 9 years ago