A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files
☆26Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for Catalyzer
Users that are interested in Catalyzer are comparing it to the libraries listed below
Sorting:
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- ☆17Jun 14, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- Enchant is is tool aimed to discover web application directory and pages by fuzzing the requests using a dictionary approach.☆25Oct 5, 2015Updated 10 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆193Mar 11, 2024Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last month
- Open-source antivirus project.☆31Nov 5, 2016Updated 9 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ☆41Feb 20, 2025Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 2 months ago
- Remote Command executor☆82Mar 11, 2023Updated 2 years ago
- IDA Python scripts☆42Apr 11, 2025Updated 10 months ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- Black Hat Python: Python for Pentesters, by EC-Council☆34Jun 20, 2024Updated last year
- The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who …☆130Feb 24, 2023Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A simple crawler written in Kotlin☆10Jul 24, 2021Updated 4 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆145Aug 2, 2023Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Nov 7, 2017Updated 8 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 2 years ago