All Projects → MurMurHash → Similar Projects or Alternatives

934 Open source projects that are alternatives of or similar to MurMurHash

OSINTBookmarks
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-56.96%)
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-24.05%)
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-22.78%)
goblin
一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+968.35%)
Mutual labels:  phishing, cybersecurity, blueteam, redteam
Stalkphish
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+224.05%)
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (+55.7%)
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+60.76%)
Mutual labels:  cybersecurity, infosec, blueteam, redteam
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-11.39%)
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-12.66%)
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+8611.39%)
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+755.7%)
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+101.27%)
Mutual labels:  cybersecurity, infosec, blueteam, redteam
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+4311.39%)
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+15.19%)
Mutual labels:  cybersecurity, infosec, threatintel
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-72.15%)
TweetFeed
Collecting IOCs posted on Twitter
Stars: ✭ 181 (+129.11%)
Mutual labels:  phishing, blueteam, phishing-detection
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+170.89%)
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-55.7%)
Awesome Red Teaming
List of Awesome Red Teaming Resources
Stars: ✭ 4,223 (+5245.57%)
Mutual labels:  phishing, redteaming, redteam
Lolbas
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 1,506 (+1806.33%)
Mutual labels:  blueteam, redteam, purpleteam
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+4602.53%)
Mutual labels:  infosec, blueteam, redteam
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-46.84%)
Mutual labels:  cybersecurity, blueteam, purpleteam
purple-team-exercise-framework
Purple Team Exercise Framework
Stars: ✭ 284 (+259.49%)
Mutual labels:  blueteam, redteam, purpleteam
Threat-Intel-Slack-Bot
Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack
Stars: ✭ 26 (-67.09%)
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-36.71%)
Mutual labels:  cybersecurity, threatintel, blueteam
Phishing catcher
Phishing catcher using Certstream
Stars: ✭ 1,232 (+1459.49%)
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+74.68%)
Mutual labels:  cybersecurity, redteaming, redteam
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-54.43%)
Mutual labels:  cybersecurity, redteaming, redteam
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-39.24%)
Mutual labels:  cybersecurity, redteaming, redteam
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+1037.97%)
Mutual labels:  cybersecurity, infosec, blueteam
Awesome Security Hardening
A collection of awesome security hardening guides, tools and other resources
Stars: ✭ 630 (+697.47%)
Mutual labels:  cybersecurity, infosec, blueteam
Dnsmorph
Domain name permutation engine written in Go
Stars: ✭ 148 (+87.34%)
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+12.66%)
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+877.22%)
Mutual labels:  cybersecurity, infosec, redteaming
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+2367.09%)
Mutual labels:  cybersecurity, infosec, blueteam
Misp Dashboard
A dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (+79.75%)
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+244.3%)
Mutual labels:  phishing, cybersecurity, infosec
Argos
This script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-7.59%)
Lolbas
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (+4722.78%)
Mutual labels:  blueteam, redteam, purpleteam
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-63.29%)
Snoop
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+1021.52%)
Mutual labels:  infosec, blueteam, redteam
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-78.48%)
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (-11.39%)
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (+41.77%)
Cypheroth
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Stars: ✭ 179 (+126.58%)
Mutual labels:  cybersecurity, blueteam, redteam
dummyDLL
Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-55.7%)
Mutual labels:  infosec, blueteam, redteam
PhishingKit-Yara-Search
Yara scan Phishing Kit's Zip archive(s)
Stars: ✭ 24 (-69.62%)
Mutual labels:  phishing, phishing-detection
TR-PhishingList
Türkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (-13.92%)
Mutual labels:  phishing, phishing-detection
palinka c2
Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-82.28%)
Mutual labels:  redteaming, redteam
SuperLibrary
Information Security Library
Stars: ✭ 60 (-24.05%)
Mutual labels:  cybersecurity, infosec
Phishing-Email-Analysis
Useful resources about phishing email analysis
Stars: ✭ 46 (-41.77%)
Mutual labels:  phishing, phishing-detection
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+153.16%)
Mutual labels:  phishing, redteam
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-58.23%)
Mutual labels:  cybersecurity, infosec
tutorials
Additional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-54.43%)
Mutual labels:  cybersecurity, infosec
edge-hot-delivery
edge --> powerpoint --> remote-file --> shell
Stars: ✭ 14 (-82.28%)
Mutual labels:  phishing, redteaming
PhishingKit-Yara-Rules
Repository of Yara rules dedicated to Phishing Kits Zip files
Stars: ✭ 71 (-10.13%)
Mutual labels:  phishing, phishing-detection
domfind
A Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-72.15%)
Mutual labels:  phishing, cybersecurity
Stinkyphish
Monitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-68.35%)
Mutual labels:  phishing, infosec
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+3854.43%)
Mutual labels:  phishing, threat-intelligence
Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+673.42%)
Mutual labels:  phishing, cybersecurity
1-60 of 934 similar projects