runZeroInc / recogLinks
Pattern recognition for hosts, services, and content
☆14Updated 3 years ago
Alternatives and similar repositories for recog
Users that are interested in recog are comparing it to the libraries listed below
Sorting:
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆44Updated 3 years ago
- Suricata rule and intel index☆33Updated 2 weeks ago
- ☆22Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Simplified go-cat agent for caldera☆11Updated last year
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆75Updated last month
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- ☆14Updated 7 years ago
- A CLI tool for querying passive DNS services☆42Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- test SSL/TLS clients how secure they are☆26Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 5 years ago
- Threat Mapping Catalogue☆18Updated 4 years ago
- repo for sharing stuff☆17Updated 4 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago