keeganhines / snowmanView external linksLinks
☆12Jun 24, 2017Updated 8 years ago
Alternatives and similar repositories for snowman
Users that are interested in snowman are comparing it to the libraries listed below
Sorting:
- Base Code for P2P Network Crawlers☆31Aug 2, 2013Updated 12 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- ☆16Mar 16, 2021Updated 4 years ago
- A small, fluid, low-interaction honeypot☆18May 20, 2019Updated 6 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆24Jul 30, 2025Updated 6 months ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Analysis of archived Tor relay RSA public keys☆24Dec 15, 2017Updated 8 years ago
- The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.☆30May 25, 2017Updated 8 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- P2P botnet detection by tracking conversations☆28Jun 5, 2015Updated 10 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated last year
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Advanced R 1-day course taught at the University of Cambridge☆11Jul 6, 2018Updated 7 years ago
- PyData Boston 2013 talks: "Intro to scikit-learn" & "Realtime Predictive Analytics: Using scikit-learn and RabbitMQ"☆11Jan 5, 2014Updated 12 years ago
- Material for a course on applied machine-learning for scientists. Taught at EPFL in spring 2018.☆11May 3, 2018Updated 7 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- A Gephi plugin for community detection in dynamic networks☆12Jan 14, 2014Updated 12 years ago
- Slides and code for "Validating Models in R" Strata 2016 RDay http://conferences.oreilly.com/strata/hadoop-big-data-ca/public/schedule/de…☆10Jun 22, 2020Updated 5 years ago
- Materials for my PyData Boston 2013 talk☆15Sep 26, 2013Updated 12 years ago
- datasets from my cyber security research papers☆10Jan 12, 2021Updated 5 years ago
- Small utility that loads any downloaded JSON databases from www.phishtank.com into Redis cache for quick local queries☆11Aug 8, 2016Updated 9 years ago
- ☆11Aug 14, 2014Updated 11 years ago
- Demo of how to create binaries with a colliding MD5☆33Feb 27, 2017Updated 8 years ago
- Flow-based SSH intrusion detection system (NfSen plugin)☆41Dec 10, 2015Updated 10 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago