keeganhines / snowmanView external linksLinks
☆12Jun 24, 2017Updated 8 years ago
Alternatives and similar repositories for snowman
Users that are interested in snowman are comparing it to the libraries listed below
Sorting:
- Base Code for P2P Network Crawlers☆31Aug 2, 2013Updated 12 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 9 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- A small, fluid, low-interaction honeypot☆18May 20, 2019Updated 6 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Analysis of archived Tor relay RSA public keys☆24Dec 15, 2017Updated 8 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.☆30May 25, 2017Updated 8 years ago
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- P2P botnet detection by tracking conversations☆28Jun 5, 2015Updated 10 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Tensorflow implementation of Collaborative Sampling for Image inpainting☆35Mar 18, 2020Updated 5 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Small utility that loads any downloaded JSON databases from www.phishtank.com into Redis cache for quick local queries☆11Aug 8, 2016Updated 9 years ago
- ☆11Aug 14, 2014Updated 11 years ago
- Advanced R 1-day course taught at the University of Cambridge☆11Jul 6, 2018Updated 7 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- datasets from my cyber security research papers☆10Jan 12, 2021Updated 5 years ago
- A Gephi plugin for community detection in dynamic networks☆12Jan 14, 2014Updated 12 years ago
- Materials for my PyData Boston 2013 talk☆15Sep 26, 2013Updated 12 years ago
- Slides and code for "Validating Models in R" Strata 2016 RDay http://conferences.oreilly.com/strata/hadoop-big-data-ca/public/schedule/de…☆10Jun 22, 2020Updated 5 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Flow-based SSH intrusion detection system (NfSen plugin)☆41Dec 10, 2015Updated 10 years ago
- Demo of how to create binaries with a colliding MD5☆33Feb 27, 2017Updated 8 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- learn the basics of gulp☆10Aug 17, 2015Updated 10 years ago