ShellSweeping the evil.
☆53Jun 18, 2024Updated last year
Alternatives and similar repositories for ShellSweep
Users that are interested in ShellSweep are comparing it to the libraries listed below
Sorting:
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆18Mar 31, 2023Updated 2 years ago
- PowerShell PE Parser☆63Jun 28, 2024Updated last year
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆41May 14, 2025Updated 9 months ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- SecuritySnack data that doesn't fit into a single tweet.☆44Dec 22, 2025Updated 2 months ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- ☆102Dec 9, 2025Updated 2 months ago
- ☆22Jan 31, 2023Updated 3 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Rules generated from our investigations.☆204Jun 17, 2025Updated 8 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆101Aug 15, 2025Updated 6 months ago
- ☆24Mar 12, 2025Updated 11 months ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆43Jul 18, 2022Updated 3 years ago
- ☆105Jul 5, 2025Updated 7 months ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- 基于机器学习的Webshell检测工具☆12May 15, 2023Updated 2 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆109Jan 3, 2023Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- A Windows Event Log MCP☆40Aug 25, 2025Updated 6 months ago
- ☆260May 9, 2024Updated last year
- ☆11Dec 22, 2020Updated 5 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 3 months ago
- ☆11Aug 3, 2018Updated 7 years ago