m4rco- / dorothy2
A malware/botnet analysis framework written in Ruby.
☆197Updated last year
Alternatives and similar repositories for dorothy2:
Users that are interested in dorothy2 are comparing it to the libraries listed below
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- Some tools to monitor BillGates CnC servers☆134Updated 10 years ago
- ☆52Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- A Swiss Army Knife for Windows Exploit Development.☆41Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- ☆86Updated last year
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- ☆36Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- ☆42Updated 2 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- ☆20Updated last year
- ☆25Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆44Updated 10 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Faraday Continuous Scanning☆33Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆42Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆39Updated last year