m4rco- / dorothy2Links
A malware/botnet analysis framework written in Ruby.
☆197Updated 2 years ago
Alternatives and similar repositories for dorothy2
Users that are interested in dorothy2 are comparing it to the libraries listed below
Sorting:
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- ☆37Updated 10 years ago
- ☆42Updated 3 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆178Updated 2 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- ☆20Updated last year
- Unix remote login tool, rootkit shell tool☆33Updated 10 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Faraday Continuous Scanning☆34Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- ☆50Updated 8 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Peach Fuzzer Web Frontend☆51Updated 4 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- ☆74Updated 3 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- The NoSQL Honeypot Framework☆102Updated 2 years ago
- ☆52Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- EQGRP-Free-Files here.,☆45Updated 9 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated 4 years ago
- Malware.lu tools☆63Updated 12 years ago