Giter VIP home page Giter VIP logo

Irrational Pi's Projects

algo icon algo

Set up a personal VPN in the cloud

amass icon amass

In-Depth DNS Enumeration and Network Mapping

cloakify icon cloakify

CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection

crits icon crits

CRITs - Collaborative Research Into Threats

crossleak icon crossleak

Code for the WWW'20 paper "Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices"

domaincat icon domaincat

Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations

entropy-buster icon entropy-buster

Entropy Buster or EBuster for short was inspired by Mining Mimecast: brute forcing your way to success by Paul Price. The attack he talked about is actually surprisingly common in the wild as a lot of companies will either use in-house custom URL encodings for link labeling or they will use existing encodings like Base64. In both of these cases unless the user is required to authorize before accessing the link, it opens a potential hole for attackers. The purpose of Entropy Buster is to take sets of strings that share some kind of commonality and look for commonly occurring characters or even static characters in the strings that can help with predictability.

firstorder icon firstorder

A traffic analyzer to evade Empire's communication from Anomaly-Based IDS

forensics icon forensics

Scripts and code referenced in CrowdStrike blog posts

gamera icon gamera

Persistent twitter monitor tool for 2021 SANS OSINT Summit Talk

ir-scripts icon ir-scripts

Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities

malware-ioc icon malware-ioc

Indicators of Compromises (IOC) of our various investigations

malware-lake icon malware-lake

A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tools

malware-repo icon malware-repo

Malware repository based on samples offered by 0xffff0800

malware-tools icon malware-tools

Various tools and scripts to help with malware analysis and reverse engineering

msticpy icon msticpy

Microsoft Threat Intelligence Security Tools

munin icon munin

Online hash checker for Virustotal and other services

newdomainsearch icon newdomainsearch

Script to pull newly-registered domains and check for similarity against a provided word list.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.