nbs-system / mowrLinks
More Obvious Webmalware Repository
☆15Updated 8 years ago
Alternatives and similar repositories for mowr
Users that are interested in mowr are comparing it to the libraries listed below
Sorting:
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- ☆19Updated 7 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- ☆50Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- YAPDNS☆39Updated 10 years ago
- post-exploitation tools☆15Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 5 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 3 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago