qeeqbox / rhinoView external linksLinks
Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
☆73Nov 12, 2023Updated 2 years ago
Alternatives and similar repositories for rhino
Users that are interested in rhino are comparing it to the libraries listed below
Sorting:
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Apr 26, 2021Updated 4 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆308Apr 15, 2024Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆192Oct 30, 2022Updated 3 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆105Jul 11, 2021Updated 4 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆126Nov 22, 2021Updated 4 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆212Aug 8, 2023Updated 2 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆826Aug 8, 2023Updated 2 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆941Dec 3, 2025Updated 2 months ago
- Minified version of Project Sherlock written in GO. Lookup given username from 1000 social networks☆32Oct 19, 2023Updated 2 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 7 months ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆24Jun 14, 2022Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated 3 weeks ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Antivirus engine that allows you to create your own anti-virus☆11Nov 2, 2012Updated 13 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Penne is an opensource AV (anti-virus) developed by Penetrum LLC☆24Apr 12, 2022Updated 3 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- a script that is fairly reliable for web OSINT☆12Jul 20, 2021Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago