ruppde / euli_treasure_huntLinks
Euli is not a computer game but a tool which helps you set up a real life treasure hunt
☆43Updated 4 years ago
Alternatives and similar repositories for euli_treasure_hunt
Users that are interested in euli_treasure_hunt are comparing it to the libraries listed below
Sorting:
- Please use https://github.com/veeral-patel/true-positive instead☆67Updated 2 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Defensomania is a security monitoring and incident response card game.☆62Updated 2 years ago
- Manage all logistical information for a pentest including clients, contacts, employees, findings, projects, scoping, and vulnerabilities.☆42Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆144Updated 3 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- ☆17Updated 6 years ago
- ☆24Updated 2 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- first commit☆20Updated last year
- Learn the basics of cryptography throughout history.☆19Updated 4 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 8 months ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Data related to the SANS Internet Storm Center☆10Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Website crawler with YARA detection☆88Updated last year