Thug's Rumāl: a Thug's dress & weapon
☆37Jan 24, 2017Updated 9 years ago
Alternatives and similar repositories for rumal
Users that are interested in rumal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- ☆16Mar 20, 2026Updated last week
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- ☆49Mar 14, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆66Feb 18, 2016Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 12 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Python low-interaction honeyclient☆1,021Updated this week
- TR-069 Honeypot☆131Mar 16, 2016Updated 10 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆57Nov 25, 2020Updated 5 years ago