Vagrant configuration to setup a Thug honeyclient VM
☆20Feb 26, 2015Updated 11 years ago
Alternatives and similar repositories for thug-vagrant
Users that are interested in thug-vagrant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- Scripts for making Hubot a CND Sidekick☆59Apr 14, 2016Updated 9 years ago
- A Python library for parsing, manipulating, and generating MAEC content.☆42Nov 16, 2020Updated 5 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Jun 18, 2019Updated 6 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Logstash configuration filter set framework to parse modsecurity audit logs☆112Jun 11, 2020Updated 5 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Analysis related to article on FOIA Online Database.☆11Feb 2, 2017Updated 9 years ago
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Jul 21, 2013Updated 12 years ago
- the green eyed monster☆22Sep 30, 2012Updated 13 years ago
- Vagrant files for a Ganeti tutorial and/or Ganeti testing environment☆28Feb 28, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC API, parse, store and diff scan results. …☆24Feb 10, 2023Updated 3 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Ansible role to manage omdistro and check_mk☆10Jun 30, 2017Updated 8 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- R Shiny App created to predict the success rate of Freedom of Information Act requests.☆16Dec 11, 2017Updated 8 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bro Snippets☆21Nov 7, 2014Updated 11 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 11 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago