johnnykv / mnemosyne
Normalizer for honeypot data.
☆45Updated 9 years ago
Related projects: ⓘ
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 3 years ago
- Detect malicious domain, Blablablablabla☆26Updated 7 years ago
- ☆21Updated 6 years ago
- A Network Inspection Tool☆79Updated 6 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆18Updated 7 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆48Updated 10 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 8 years ago
- Passive DNS V2☆62Updated 10 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆40Updated 7 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- ☆16Updated 9 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 5 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated 8 months ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 8 years ago
- API Tools☆27Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated 11 months ago
- AYY LMAO☆21Updated 8 years ago
- A warehouse for your malware☆131Updated 11 years ago
- CRITs IOC Visualization in Maltego☆27Updated 9 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆32Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year