I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!
☆20Mar 21, 2018Updated 7 years ago
Alternatives and similar repositories for fml
Users that are interested in fml are comparing it to the libraries listed below
Sorting:
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Command-line tool to search for malware samples in various repositories☆12Mar 3, 2022Updated 4 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60May 16, 2019Updated 6 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- Our aim is to build a multi-party 'off the record' messaging plugin for various clients.☆34Feb 9, 2014Updated 12 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 5 years ago
- ☆16Updated this week
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Terminal Linux Syscall Reference Table for x86, x64, arm32 and arm64☆21May 24, 2020Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆55Oct 25, 2018Updated 7 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Mar 30, 2018Updated 7 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- ☆30Jul 11, 2018Updated 7 years ago
- darm - intelligent network sniffer for the masses darm is an attempt to create a very easy to use app that will sniff and report informa…☆30Jun 14, 2013Updated 12 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month