oherrala / xipologyLinks
☆18Updated 2 years ago
Alternatives and similar repositories for xipology
Users that are interested in xipology are comparing it to the libraries listed below
Sorting:
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- ☆52Updated 7 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Updated 9 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- AYY LMAO☆22Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- An offensive Powershell console☆30Updated 10 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Threat Intel and Incident Reponse☆10Updated 7 years ago
- ☆97Updated 9 years ago
- Detect Phishing with Bro IDS☆19Updated 8 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago