Network sinkhole for isolated malware analysis
☆40Mar 5, 2018Updated 7 years ago
Alternatives and similar repositories for netsink
Users that are interested in netsink are comparing it to the libraries listed below
Sorting:
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Dec 8, 2022Updated 3 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- ☆10Feb 7, 2020Updated 6 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- ☆31Aug 26, 2015Updated 10 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Redirects a specified API for a one time execution of code upon injection into a process.☆15Nov 24, 2020Updated 5 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- A server-sided 317 framework for RuneScape Private servers using Java's NIO API (deprecated, reference only)☆10Jan 29, 2016Updated 10 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated 10 months ago
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 2 months ago
- Tool to extract contents from the memory of Windows systems.☆13Jul 4, 2023Updated 2 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- An inbuilt champion ability timer for League of Legends - works on allies and enemies.☆28Mar 14, 2017Updated 8 years ago
- ☆26May 22, 2015Updated 10 years ago
- Static and Dynamic Analysis of Malware Samples☆12Mar 12, 2020Updated 5 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- A library for building Web clients for keybase, either in the browser or for testing in node.☆15Apr 16, 2023Updated 2 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- General scripts for random stuff☆38Oct 29, 2021Updated 4 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- ☆29Jul 26, 2016Updated 9 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago