joswr1ght / bitfitLinks
Recursively validate a starting directory of file contents to identify changes, corrupt data
☆37Updated 5 years ago
Alternatives and similar repositories for bitfit
Users that are interested in bitfit are comparing it to the libraries listed below
Sorting:
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- ☆30Updated 7 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Different tools, koen.vanimpe@cudeso.be☆136Updated 5 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 9 years ago
- ☆39Updated 5 years ago
- Python script to batch query the Tor Relays and Bridges☆37Updated 6 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆70Updated 2 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Python Forensic and Log Analysis GUI☆27Updated 11 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Updated 9 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆91Updated last year
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- ☆79Updated last month
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Updated 9 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- A collection of typical false positive indicators☆55Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Alienvault OTX TAXII connector☆56Updated 8 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- ☆77Updated 6 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- ☆55Updated 4 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Updated 4 months ago
- Data related to the SANS Internet Storm Center☆14Updated 4 months ago