Scumblr instructions with custom search providers for monitoring malicous content
☆17Nov 18, 2017Updated 8 years ago
Alternatives and similar repositories for Scumblr_Security_Tool
Users that are interested in Scumblr_Security_Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- Some stuff about the TCP flags field in NetFlow/IPFIX Data☆12Dec 31, 2015Updated 10 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- ☆12Jan 7, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Sep 12, 2024Updated last year
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- 8ball☆17Sep 7, 2023Updated 2 years ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆24Jan 9, 2019Updated 7 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- A collection of chicken photos. Useful for training computer vision models to identify chickens.☆12Oct 6, 2017Updated 8 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Aug 30, 2020Updated 5 years ago
- ☆24Dec 1, 2015Updated 10 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- Maltego Integration of https://www.fullcontact.com/ @FullContact☆26Jul 20, 2022Updated 3 years ago
- AWS S3 Bucket/Object Finder☆124Jul 13, 2021Updated 4 years ago
- Android Client for MythTV☆15Aug 20, 2018Updated 7 years ago
- ☆48Aug 7, 2019Updated 6 years ago
- Parse Yara rules and operate over them more easily.☆51Jan 7, 2019Updated 7 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- General repository for compiled and uncompiled EnCase EnScripts☆46Mar 11, 2021Updated 5 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Command line interface to Carbon Black Response☆38May 12, 2020Updated 5 years ago
- Red Canary Carbon Black API☆20Jan 30, 2016Updated 10 years ago
- Pastebin Monitoring as a Service☆73Feb 26, 2014Updated 12 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Apr 20, 2018Updated 8 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Home Assistant OS Self-Signed certificate injector☆17Jan 28, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆82Apr 14, 2026Updated 3 weeks ago
- Detect credit card exposures with Bro☆15Nov 12, 2023Updated 2 years ago
- http://malware.wicar.org HTML content, which includes test browser exploits. See http://wicar.org/ for details.☆32Jul 10, 2018Updated 7 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago