joswr1ght / bitfitLinks
Recursively validate a starting directory of file contents to identify changes, corrupt data
☆37Updated 5 years ago
Alternatives and similar repositories for bitfit
Users that are interested in bitfit are comparing it to the libraries listed below
Sorting:
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- ☆30Updated 7 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated 4 months ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 9 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆69Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- ☆50Updated 5 years ago
- Create a MS Word index file from PowerPoint notes and slides☆45Updated 3 months ago
- ☆39Updated 5 years ago
- ☆77Updated 6 years ago
- automate your MISP installs☆68Updated 5 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- Data related to the SANS Internet Storm Center☆13Updated 3 months ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆91Updated last year
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- ☆37Updated 4 years ago
- ☆55Updated 4 years ago