quarkslab / irma-frontendLinks
IRMA frontend
☆25Updated 9 years ago
Alternatives and similar repositories for irma-frontend
Users that are interested in irma-frontend are comparing it to the libraries listed below
Sorting:
- IRMA ansible☆24Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- Kippo configured to be a backdoored netscreen☆11Updated 10 years ago
- Parallel APK analyzer☆51Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 6 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 7 years ago
- Scalable Binary Data Extraction in Hadoop☆144Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Updated last year
- DEPRECATED USE v3!☆59Updated 10 years ago
- YAPDNS☆39Updated 10 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- ☆12Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 9 years ago
- IRMA brain☆21Updated 9 years ago
- A virtual PDF analysis framework☆17Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Cryptowall Tooling & Information☆37Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- ☆27Updated 8 years ago