A Simple Network Stream Recorder
☆35Mar 23, 2019Updated 7 years ago
Alternatives and similar repositories for derrick
Users that are interested in derrick are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Tool for Embedding Strings in Vector Spaces☆58May 8, 2019Updated 6 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Protocol Inspection and State Machine Analysis☆23May 26, 2018Updated 7 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- A Content Anomaly Detector based on n-Grams☆24Jun 17, 2016Updated 9 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 11 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- ☆22Jun 18, 2015Updated 10 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Nov 26, 2015Updated 10 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- Original attempt to port Minecraft Pi to Python 3☆25Jan 27, 2020Updated 6 years ago
- Python utilities for joern☆36Nov 13, 2018Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- A python interface to joern (deprecated).☆34Nov 13, 2018Updated 7 years ago
- ☆16Mar 10, 2017Updated 9 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 2 months ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- A honeypot for malware that propagates via USB storage devices☆103Mar 24, 2015Updated 10 years ago
- ARP cache poisoning implementation using Scapy☆13Jul 14, 2019Updated 6 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Hacking the Parrot☆34Jul 29, 2018Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- CSV processing and web related data types mutual conversion☆17Feb 24, 2026Updated 3 weeks ago
- PING (Ping Is Not Googledocs) is a numeric tool for sharing notes taking in real time, without disturbing note takers.☆11Apr 18, 2016Updated 9 years ago
- 向TSRC投稿的文章,对应的pdf,代码和思维导图☆21Sep 18, 2020Updated 5 years ago
- ☆26Jun 22, 2014Updated 11 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- A generic decorator based ssh protocol message fuzzer based paramiko the Native Python SSHv2 protocol library☆13Jan 2, 2020Updated 6 years ago
- ransomware_begone☆42Mar 15, 2016Updated 10 years ago
- ☆16Oct 4, 2012Updated 13 years ago
- Newlib port for Switch☆11Sep 19, 2018Updated 7 years ago
- HPCToolkit performance tools: libmonitor - a substrate for monitoring tools☆21Mar 16, 2023Updated 3 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆12Aug 22, 2017Updated 8 years ago
- C++11 library for many-sorted logics☆39Nov 21, 2016Updated 9 years ago