Spoofy
Sooty
Spoofy | Sooty | |
---|---|---|
2 | 1 | |
542 | 1,284 | |
- | - | |
5.4 | 0.0 | |
2 months ago | 7 months ago | |
Python | Python | |
Creative Commons Zero v1.0 Universal | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Spoofy
Sooty
-
A user has opened an attachment in a phishing email (MIME file, possibly .pdf). Our antivirus isn't finding anything, and there are no clear indications of compromise. We don't have a clear policy to respond to things like this. What would you do?
I haven't played with this yet, but it looks promising for trying to automate your OSINT when researching phishing emails: https://github.com/TheresAFewConors/Sooty
What are some alternatives?
vulnerable-code-snippets - Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.
MultiQC - Aggregate results from bioinformatics analyses across many samples into a single report.
SSTImap - Automatic SSTI detection and exploitation tool with interactive interface
PhishingKitTracker - Let's track phishing kits to give to research community raw material to study !
crimson - Web Application Security Testing Tools
spate - Quickly create workflows, business and process automation pipelines. Supports API, UI and Cron based workflows.
mi-x - Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
STARS - A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services that could possibly lead to subdomain takeover scenarios.
blackhat_python_book_code - Source code and exercises from the book "Black Hat Python" by Justin Seitz.
intelmq - IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Subdominator - The Internets #1 Subdomain Takeover Tool
cytoflow - A Python toolbox for quantitative, reproducible flow cytometry analysis