m4rco- / dorothy2Links
A malware/botnet analysis framework written in Ruby.
☆196Updated last year
Alternatives and similar repositories for dorothy2
Users that are interested in dorothy2 are comparing it to the libraries listed below
Sorting:
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- ☆42Updated 2 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- ☆25Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- ☆85Updated last year
- ☆52Updated 10 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 8 years ago
- Juniper backdoor☆13Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- ☆74Updated 2 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- ☆46Updated 9 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 8 years ago