runZeroInc / recogLinks
Pattern recognition for hosts, services, and content
☆14Updated 3 years ago
Alternatives and similar repositories for recog
Users that are interested in recog are comparing it to the libraries listed below
Sorting:
- Threat Mapping Catalogue☆18Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated this week
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- HoneyDB Python Module☆14Updated last year
- egrets monitors egress☆46Updated 5 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16Updated 8 years ago
- ☆24Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- ☆22Updated 5 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- ☆15Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- Parse nmap scan data with Perl (official repo)☆37Updated 6 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- This repository contains tools used by 401trg.☆20Updated 4 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated this week
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ☆14Updated 7 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Updated 7 years ago
- repo for sharing stuff☆17Updated 6 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 3 months ago