jusafing / pnafLinks
Passive Network Audit Framework
☆32Updated 7 years ago
Alternatives and similar repositories for pnaf
Users that are interested in pnaf are comparing it to the libraries listed below
Sorting:
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Passive DNS V2☆60Updated 11 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 5 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- SMTP server / sinkhole for collecting spam☆45Updated 7 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- ☆52Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 10 months ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago