trailofbits / nyc-infosec
Mapping the NYC Infosec Community
☆50Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for nyc-infosec
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- POLAR☆73Updated 5 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- ☆15Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆94Updated 9 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 6 years ago
- Threatbutt python client and Maltego transforms☆49Updated 5 months ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 9 years ago
- first commit☆20Updated last year
- Notes and reference for ongoing forecasting.☆16Updated 2 years ago
- A tool for netpens.☆29Updated 5 years ago
- ☆198Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆21Updated 8 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- ☆45Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- ☆50Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Threatbutt Suite☆36Updated 9 years ago