All Zero Nights 2016 'A threat hunter himself' stuff
☆16Nov 18, 2016Updated 9 years ago
Alternatives and similar repositories for ZN2016
Users that are interested in ZN2016 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Mar 22, 2018Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Monitoring attacks with elastick, kibana, grok, logstash and beats☆20Mar 2, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Mar 20, 2026Updated 3 weeks ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WAF Testing Tool☆21May 16, 2014Updated 11 years ago
- ☆12Apr 7, 2016Updated 10 years ago
- An IOC framework written in PowerShell☆19Jan 3, 2017Updated 9 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Sep 13, 2022Updated 3 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Useful tools for working with the PassiveTotal API in R☆13Mar 6, 2016Updated 10 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- Some useful scripts I wrote☆13Nov 29, 2018Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- macOS vulnerability management for individuals☆27Jan 7, 2023Updated 3 years ago
- small IR scripts for orgs using G Suite☆18Feb 27, 2019Updated 7 years ago
- A Windows DNS content pack for graylog.☆20Dec 13, 2023Updated 2 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Dockerized version of rspamd, based on Ubuntu☆11Feb 9, 2026Updated 2 months ago
- ☆13Apr 6, 2016Updated 10 years ago
- Script for tracking file system changes☆19Jan 23, 2018Updated 8 years ago