scrapbird / sarlaccLinks
SMTP server / sinkhole for collecting spam
☆45Updated 7 years ago
Alternatives and similar repositories for sarlacc
Users that are interested in sarlacc are comparing it to the libraries listed below
Sorting:
- Simple DDE object detector☆56Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Leak File Analyzer☆62Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 8 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- An offensive Powershell console☆30Updated 9 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Process HTTP Pcaps With YARA☆106Updated 12 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago