A tool to identify and investigate inauthentic GitHub user accounts and repositories.
☆84Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for ghbuster
Users that are interested in ghbuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Aug 27, 2025Updated 6 months ago
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Oct 30, 2024Updated last year
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 5 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Scan GitHub Actions Workflow logs for IOCs☆16Mar 16, 2026Updated last week
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- various tools for Microsoft Sentinel☆32Jun 26, 2025Updated 9 months ago
- ☆163Updated this week
- AI-powered security alert management that reduces noise and accelerates response time☆97Updated this week
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆119Aug 19, 2025Updated 7 months ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated last year
- Patched Bash 3.2.24 to log all actions to syslog☆13Dec 16, 2017Updated 8 years ago
- AzLogDcrIngestPS - Unleashing the power of Log Ingestion API with Azure LogAnalytics custom table v2, Azure Data Collection Rules and Azu…☆32Jan 26, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated last month
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 2 months ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- The OWASP SAMM Website☆11Mar 7, 2026Updated 2 weeks ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- ☆17Dec 14, 2019Updated 6 years ago
- Dataset fingerprinting for AIBOM☆15Mar 17, 2026Updated last week
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆44Sep 16, 2025Updated 6 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ☆103Nov 21, 2025Updated 4 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- This repository is just a mirror. Use the bitbucket repository for issues and pull requests.☆11Dec 6, 2021Updated 4 years ago
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 10 months ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- ☆12Oct 24, 2022Updated 3 years ago
- A Pentester's Powershell Client☆51Nov 23, 2025Updated 4 months ago
- Personal scripts☆15Sep 11, 2024Updated last year
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- ☆39Jul 31, 2025Updated 7 months ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Mar 20, 2026Updated last week