ShellSweeping the evil.
☆53Jun 18, 2024Updated last year
Alternatives and similar repositories for ShellSweep
Users that are interested in ShellSweep are comparing it to the libraries listed below
Sorting:
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 10 months ago
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆18Mar 31, 2023Updated 2 years ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- PowerShell PE Parser☆63Jun 28, 2024Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- ☆15Sep 24, 2024Updated last year
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆44Jul 18, 2022Updated 3 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Aug 15, 2025Updated 7 months ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- ☆107Dec 9, 2025Updated 3 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆87Mar 11, 2026Updated last week
- ☆263May 9, 2024Updated last year
- Rules generated from our investigations.☆204Jun 17, 2025Updated 9 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- SecuritySnack data that doesn't fit into a single tweet.☆45Feb 26, 2026Updated 3 weeks ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Authenticode for PNG files☆11Jun 8, 2020Updated 5 years ago
- ☆105Jul 5, 2025Updated 8 months ago
- ☆22Jan 31, 2023Updated 3 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- yaa - yaml search for humans☆12Dec 8, 2025Updated 3 months ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 4 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆215May 23, 2020Updated 5 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 4 months ago
- Remote access and Antivirus Logging Database☆45Apr 28, 2024Updated last year
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆505Mar 4, 2026Updated 2 weeks ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Decoding of Microsoft Script Encoder☆14Dec 29, 2018Updated 7 years ago