vladalexgit / checkpotLinks
Checkpot Honeypot Checker
☆27Updated 7 years ago
Alternatives and similar repositories for checkpot
Users that are interested in checkpot are comparing it to the libraries listed below
Sorting:
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Updated 6 years ago
- Public repository for Red Canary Research☆38Updated 5 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- ☆14Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 months ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ☆30Updated 5 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- ☆28Updated 6 years ago
- Tool to predict attacker groups from the techniques and software used☆50Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- A Darktrace CLI written in Python☆16Updated 6 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- buffer overflow examples☆23Updated 8 years ago
- ProcDot Malware Sandbox☆26Updated 5 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Some malware samples or suspicious files I found and their reports.☆37Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- ☆23Updated 5 years ago