welllima88 / sharkPy
☆12Updated 7 years ago
Alternatives and similar repositories for sharkPy:
Users that are interested in sharkPy are comparing it to the libraries listed below
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Updated 7 years ago
- Passive DNS V2☆62Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- Scapy Penetration testing scripts☆22Updated 9 years ago
- ☆57Updated 10 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 3 months ago
- Passive Network Audit Framework☆32Updated 6 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 12 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- Quickly generate snort rules for IOCs☆18Updated 9 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- API to use Cymru services☆27Updated 11 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 5 months ago