☆41Apr 5, 2025Updated last year
Alternatives and similar repositories for turncoat
Users that are interested in turncoat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 4 months ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Python client for the Global CVE Allocation System.☆17Mar 26, 2026Updated 2 weeks ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 9 years ago
- ☆21Apr 19, 2024Updated last year
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆38Mar 10, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- A simple provider to analyse what gets passed into Microsoft's Anti-Malware Scan Interface☆17Jan 10, 2020Updated 6 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- ☆27May 6, 2024Updated last year
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆56Jul 8, 2022Updated 3 years ago
- Gather information on Wiki contributions from IP ranges☆23Jan 21, 2018Updated 8 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- ☆28Jun 2, 2021Updated 4 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Sep 8, 2022Updated 3 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆43Jul 18, 2022Updated 3 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆14Sep 13, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Mar 12, 2026Updated last month
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year