Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
☆46Nov 1, 2021Updated 4 years ago
Alternatives and similar repositories for DomainCAT
Users that are interested in DomainCAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 5 years ago
- ☆20Oct 23, 2020Updated 5 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆13Feb 5, 2023Updated 3 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆31Feb 13, 2026Updated 2 months ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 10 months ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆20May 20, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Converting data from services like Censys and Shodan to a common data model☆52Apr 14, 2026Updated 2 weeks ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- Automating SQL Injection in a list of URLs or Request Files☆12Aug 8, 2016Updated 9 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 11 months ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- ☆21Dec 7, 2021Updated 4 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 3 months ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago