A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files
☆26Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for Catalyzer
Users that are interested in Catalyzer are comparing it to the libraries listed below
Sorting:
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Enchant is is tool aimed to discover web application directory and pages by fuzzing the requests using a dictionary approach.☆25Oct 5, 2015Updated 10 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- A cleaned up Go version of TxtElite☆10Nov 14, 2022Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- Modeling and simulation of ICS devices☆13Mar 6, 2026Updated 2 weeks ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- ☆18Mar 15, 2026Updated last week
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆12Apr 3, 2023Updated 2 years ago
- ☆29Aug 21, 2024Updated last year
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆40Updated this week
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 7 months ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- ☆195Mar 11, 2024Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆12Updated this week
- burpsuite extension☆14Feb 1, 2023Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆16Oct 8, 2025Updated 5 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- ☆41Feb 20, 2025Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- A starter project to create Arc jobs using the Jupyter Notebook interface☆22Mar 25, 2021Updated 4 years ago