ntddk / onionstackLinks
A Pictorial Book of Tor Hidden Services.
☆25Updated 7 years ago
Alternatives and similar repositories for onionstack
Users that are interested in onionstack are comparing it to the libraries listed below
Sorting:
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Updated 2 years ago
- RAT / Botnet Simulator for pentest / education☆82Updated 6 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆66Updated 5 months ago
- ☆26Updated 5 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54Updated last year
- Malquarium - Modern Malware Repository☆47Updated last month
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 6 years ago
- Short little AV Test to check Detection Rates☆20Updated 4 years ago
- Various tools to track the Mirai botnet☆20Updated 9 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- ☆45Updated 5 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- bap - http Basic Authentication honeyPot☆51Updated 10 years ago
- Spam trap management☆23Updated last year
- Software exploitation training material☆16Updated 8 years ago
- Process HTTP Pcaps With YARA☆107Updated 12 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- ☆18Updated last year
- Parses Java Cache IDX files☆39Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆49Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated 2 years ago