runZeroInc / recogLinks
Pattern recognition for hosts, services, and content
☆13Updated 3 years ago
Alternatives and similar repositories for recog
Users that are interested in recog are comparing it to the libraries listed below
Sorting:
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Threat Mapping Catalogue☆17Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 10 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Historical Tracking of MAC Address Assignments☆35Updated this week
- ☆22Updated 4 years ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- ☆14Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆59Updated 11 months ago
- egrets monitors egress☆46Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- pcapdj - dispatch pcap files☆46Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆74Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago