Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
☆46Nov 1, 2021Updated 4 years ago
Alternatives and similar repositories for DomainCAT
Users that are interested in DomainCAT are comparing it to the libraries listed below
Sorting:
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated last month
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 10 months ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 9 months ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated 3 weeks ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago