certstreamcatcher – Catching phishing by observing certificate transparency...
Catching phishing by observing certificate transparency logs. certstreamcatcher is based on regex with effective standards for detecting phishing sites in real time using certstream. Usage: The...
View ArticlePiKarma- Detects wireless network attacks performed by KARMA module (fake AP).
PiKarma is a tools for Detection wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points). PiKarma Working Principle for PiKarma: – Collects...
View ArticleFSRM-ANTICRYPTO : Protect servers against crypto attacks.
Use FSRM-ANTICRYPTO to protect your Windows servers against Crypto attacks and keep the Crypto filegroup extensions up to date. A very completelist is maintained by experiant.ca with infos gave by the...
View ArticleCFC – Centralized Firewall Control script.
(CFC) Centralized firewall control provides a centralized way to manage the firewall on multiple servers or loadbalancers running iptables. This way you can quickly allow/block/del/search abuse ranges...
View Articlemavtables – A MAVLink router and firewall.
mavtables is A MAVLink router and firewall. It can connect over serial and UDP with 2 or more MAVLink endpoints such as autopilots, ground control software, loggers, image capture systems, etc. MAVLink...
View ArticleWireSpy (wsd) – captures packets and generates firewall rules and netflow logs.
What is wsd? Wirespy is a simple network sniffer for information security that extracts interesting metadata about network traffic and logs it. That sounds like a million other security and network...
View ArticleSpectre & Meltdown vulnerability/mitigation detection tool for Linux.
Spectre & Meltdown Checker is A simple shell script to tell if your Linux installation is vulnerable against the 3 “speculative execution” CVEs: CVE-2017-5753 bounds check bypass (Spectre Variant...
View ArticleGPS-SDR-SIM : generates GPS baseband signal data streams simulator.
GPS-SDR-SIM generates GPS baseband signal data streams, which can be converted to RF using software-defined radio (SDR) platforms, such as bladeRF(http://nuand.com/),...
View Articleflightsim – A utility to generate malicious network traffic and evaluate...
flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS...
View ArticleDDOM or Daily Dose of Malware allows you to gather malware and c&c from open...
DDOM or Daily Dose of Malware is a Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon – vxvault, cybercrime tracker and c2...
View Articleprotobuf-inspector – Tool to reverse-engineer Protocols Buffers with unknown...
protobuf-inspector is a Simple program that can parse Google Protobuf(https://developers.google.com/protocol-buffers) encoded blobs (version 2 or 3) without knowing their accompanying definition. It...
View ArticleShellen is an interactive shellcoding environment.
Shellen is an interactive shellcoding environment. If you want a handy tool to write shellcodes, then shellen may be your friend. Also, it can be used just as assembly/disassembly tool. Features: +...
View Articlescanmem is an interactive debugging utility and memory scanner for Linux.
scanmem is a debugging utility designed to isolate the address of an arbitrary variable in an executing process. scanmem simply needs to be told the pid of the process and the value of the variable at...
View ArticleCleanDNS – A DNS based malware protection.
CleanDNS is a Proof of Concept Technology for protecting End Users from malware, advanced threat and other malicious content by preventing DNS malicious Request/Responses. cleandns Features: + Inline...
View ArticleLuLu is the free open-source mac-OS firewall that aims to block unauthorized...
LuLu is the free open-source mac-OS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the user. To Build LuLu should build cleanly in Xcode (though you...
View ArticleGrouper – A PowerShell script for helping to find vulnerable settings in AD...
Grouper is a slightly wobbly PowerShell module designed for pentesters and redteamers (although probably also useful for sysadmins) which sifts through the (usually very noisy) XML output from the...
View ArticleScrapper for Realtime Attacks and Malware Spread Data.
This repository contain scrapper for collecting Real-time Attacks and Malware Spread Data provided by Norse Corp, Check Point Software Technologies, Malwarebytes, Fortinet, and LookingGlass Cyber...
View ArticleRevoke-Obfuscation : PowerShell obfuscation detection framework.
The goal of Revoke-Obfuscation research and these frameworks was to highlight the limitations of a purely signature-based approach to detecting attackers’ usage of PowerShell. The core message to...
View ArticleDr. Mine is a node script written to aid automatic detection of in-browser...
Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking. The most accurate way to detect things that happen in a browser is via browser itself. Thus, Dr. Mine uses...
View ArticleMADLIRA – Malware detection using learning and information retrieval for...
MADLIRA is a tool for Android malware detection. It consists in two components: TFIDF component and SVM learning component. In gerneral, it takes an input a set of malwares and benwares and then...
View Article