Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
☆46Nov 1, 2021Updated 4 years ago
Alternatives and similar repositories for DomainCAT
Users that are interested in DomainCAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 5 years ago
- ☆20Oct 23, 2020Updated 5 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆13Feb 5, 2023Updated 3 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆31Feb 13, 2026Updated 3 months ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 11 months ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆20May 20, 2025Updated last year
- Converting data from services like Censys and Shodan to a common data model☆52May 11, 2026Updated last week
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Automating SQL Injection in a list of URLs or Request Files☆12Aug 8, 2016Updated 9 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆21Dec 7, 2021Updated 4 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 4 months ago
- ☆37Dec 17, 2020Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago