kaie / sphere-detection
Various modules to implement the DetecTor design from http://detector.kuix.de
☆52Updated 8 years ago
Alternatives and similar repositories for sphere-detection
Users that are interested in sphere-detection are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- See here:☆42Updated 12 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Host files with DNS☆32Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆24Updated 9 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Notebook collection☆10Updated 6 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- intel amt honeypot☆18Updated 8 years ago
- ☆12Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆12Updated 10 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- eSentire additions to the nmap network scanner☆13Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago