I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!
☆20Mar 21, 2018Updated 8 years ago
Alternatives and similar repositories for fml
Users that are interested in fml are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60May 16, 2019Updated 6 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆18Apr 19, 2016Updated 9 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 6 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Apr 4, 2016Updated 9 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆55Oct 25, 2018Updated 7 years ago
- Team Cymru IP to ASN command line tool☆13Nov 18, 2025Updated 4 months ago
- Cryptris, a game about asymmetric cryptography☆18Sep 6, 2014Updated 11 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Our aim is to build a multi-party 'off the record' messaging plugin for various clients.☆34Feb 9, 2014Updated 12 years ago
- 🕶 Cross-platform network interface command-line utility.☆18Jan 23, 2023Updated 3 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- IOCs and notes related to malware☆27Jul 7, 2025Updated 8 months ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Repo for hugo generated files☆13Feb 4, 2026Updated last month
- [DEPRECATED] utility functions for several generative algorithms.☆10Sep 5, 2016Updated 9 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- to be deleted - check github.com/corkami☆13Sep 16, 2014Updated 11 years ago
- A re-implementation of the Cuphead expert mode with all-new content☆12Nov 11, 2024Updated last year
- ☆26Apr 5, 2020Updated 5 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- ☆38Aug 22, 2018Updated 7 years ago
- ☆36Jan 27, 2025Updated last year