jekil / hardentheworldView external linksLinks
Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
☆196Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for hardentheworld
Users that are interested in hardentheworld are comparing it to the libraries listed below
Sorting:
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- ☆13Jun 17, 2019Updated 6 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Python OSINT Tool to retrieve information from Skype☆77Oct 12, 2015Updated 10 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,893Jun 19, 2019Updated 6 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Preventing OS X from phoning home to Cupertino☆298Jul 8, 2018Updated 7 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆37Aug 22, 2016Updated 9 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆60Dec 6, 2020Updated 5 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- ☆24Apr 7, 2018Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Application which generates the structure and related files necessary for developing a Data Exchange Layer (DXL) integration with Python☆12Mar 17, 2020Updated 5 years ago
- File Transfer Server Framework☆12Feb 13, 2017Updated 9 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- This is an OS X Privilege escalation exploit. The Payload function of this exploit is sending a root shell. Change the IP and the destina…☆34Dec 16, 2016Updated 9 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago