trylinux / liftLinks
Low-Impact Fingerprint Tool
☆59Updated 4 months ago
Alternatives and similar repositories for lift
Users that are interested in lift are comparing it to the libraries listed below
Sorting:
- a low-interaction honeypot☆95Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- Open Source Telnet Honeypot☆106Updated 8 years ago
- Python Malware Crawler for Zoos and Repositories☆109Updated 7 years ago
- OpenDNS Graph Miner☆45Updated 8 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- ☆46Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Updated 6 years ago
- Passive DNS V2☆60Updated 11 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Manage VT Alerts☆62Updated 9 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated 2 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Updated 10 years ago
- Malware Repository Framework☆99Updated 7 years ago
- A warehouse for your malware☆135Updated 2 months ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago