A sinkhole for collecting and analysing malicious traffic
☆17Sep 12, 2020Updated 5 years ago
Alternatives and similar repositories for sinkholed
Users that are interested in sinkholed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utility to scrape pastebin's incoming feed for known malware techniques☆20Feb 4, 2020Updated 6 years ago
- Commandline utility to interact with the Malpedia service☆22Dec 5, 2025Updated 4 months ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- For all these times you're asking yourself "what is this panel again?"☆262Jan 29, 2026Updated 2 months ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Research only!☆15Aug 1, 2018Updated 7 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- ☆23May 19, 2019Updated 6 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Topics and question bank for Peter Drake's computer science courses☆15Jan 8, 2026Updated 3 months ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 6 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- PyCon 2017 talk about using abstraction to help with Library UX☆12May 20, 2017Updated 8 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- A Python toolbox for Mach-O files analysis.☆21Jun 21, 2024Updated last year
- Script analysis tool based on Frida.re☆131May 31, 2017Updated 8 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆12Jul 12, 2022Updated 3 years ago
- My own technical notes☆26Feb 6, 2026Updated 2 months ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆30Dec 27, 2019Updated 6 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last month