Python library for managing malware feeds and blacklists published online by third parties.
☆10Nov 13, 2015Updated 10 years ago
Alternatives and similar repositories for malfeeds
Users that are interested in malfeeds are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- Git repo to unify JWT/OIDC vault auth terraform projects☆13Feb 16, 2022Updated 4 years ago
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- Elegant deployment with Fabric and Puppet.☆116Jun 12, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SCAPtimony is SCAP database and storage server☆13May 31, 2018Updated 7 years ago
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- Securely manage privileged account credentials via Shamir secret sharing☆57Nov 27, 2021Updated 4 years ago
- This is the source code for the OpenChain Project Conformance Online Self-Certification Web App☆12Nov 24, 2023Updated 2 years ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆29Feb 26, 2016Updated 10 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39May 10, 2017Updated 8 years ago
- Command Line Tool to monitor and manipulate docker containers☆12Oct 5, 2015Updated 10 years ago
- Enrich a host with open source security information☆27Oct 4, 2015Updated 10 years ago
- This is a template project for using kitchen for puppet development☆13Dec 6, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆11Jul 11, 2017Updated 8 years ago
- Blindtest is a multiplayer musical game (up to 16 simultaneous players)☆13Dec 11, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Back, back, back in time... before there were fancy schmanzy web GUIs... along came SATAN.☆13Jul 10, 2015Updated 10 years ago
- Search NVD locally☆14Jun 4, 2025Updated 9 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Source of the Symbolic Execution-based Test Tool Evaluator (SETTE)☆11Nov 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC, parse and diff scan results. It's wonder…☆13Feb 10, 2023Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- DEPRECATED - My r10k/puppet based workstation bootstrapping and configuration☆16Jan 17, 2024Updated 2 years ago
- Building a portable docker based developer toolbox☆12Sep 10, 2016Updated 9 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- SPDX 2.0 document creation and storage☆16Dec 13, 2022Updated 3 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The python client of 360 Netlab whois database☆14Dec 5, 2018Updated 7 years ago
- A complete configuration lifecycle managment, from dev to production☆81Nov 14, 2017Updated 8 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Services called by the CCADB Salesforce instance to perform specific tasks☆18Mar 20, 2026Updated last week
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated 2 months ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago