mushorg / oschameleonLinks
OS Fingerprint Obfuscation for modern Linux Kernels
☆77Updated last year
Alternatives and similar repositories for oschameleon
Users that are interested in oschameleon are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- YAPDNS☆39Updated 10 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Passive DNS V2☆60Updated 11 years ago
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69Updated 3 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 4 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- VirusTotal tools☆92Updated 5 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- A warehouse for your malware☆135Updated last month
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago