☆22Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for Hoarder
Users that are interested in Hoarder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Manage Your Large Team of Consultants☆12Sep 18, 2025Updated 8 months ago
- Digital Forensics Investigation Platform☆887Oct 12, 2024Updated last year
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 9 months ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Quick ESXi Log Parser☆31Oct 20, 2025Updated 7 months ago
- Powershell script to monitor a wireless adapter every second until it disconnects.☆14May 15, 2024Updated 2 years ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆59Jun 24, 2025Updated 10 months ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆212Oct 19, 2020Updated 5 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 5 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Apr 28, 2026Updated 3 weeks ago
- ☆33Jun 27, 2022Updated 3 years ago
- ☆23Mar 12, 2025Updated last year
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆47Apr 4, 2026Updated last month
- A Windows Event Log MCP☆46Aug 25, 2025Updated 8 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 3 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama a…☆30Mar 8, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Rules generated from our investigations.☆208Jun 17, 2025Updated 11 months ago
- Azure apim mini proxy☆58Feb 16, 2026Updated 3 months ago
- 🐳 Small Docker container to sniff the traffic of any other Docker container with tcpdump☆15Jul 16, 2022Updated 3 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆18Dec 29, 2024Updated last year
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- ☆37Dec 17, 2020Updated 5 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- SryRMS helps you in installing some popular proprietary as well as libre applications not available in the official repositories of Ubunt…☆14Jul 31, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- ☆35Oct 20, 2024Updated last year
- ☆66Sep 1, 2023Updated 2 years ago
- An API wrapper around the ewelink-api☆36Feb 3, 2025Updated last year
- ☆27Feb 3, 2026Updated 3 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆146Apr 10, 2024Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago