MORSECorp / snappiershotView external linksLinks
☆29Jun 7, 2022Updated 3 years ago
Alternatives and similar repositories for snappiershot
Users that are interested in snappiershot are comparing it to the libraries listed below
Sorting:
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- Parse and Convert a Dockerfile to Bash script.☆11Apr 20, 2018Updated 7 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Puppet Guide☆10Jan 2, 2022Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 7 years ago
- Search for secrets left in git history☆14Sep 22, 2018Updated 7 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 9 months ago
- RestBook is an open-source CLI tool for orchestrating complex API workflows using simple YAML playbooks.☆16Apr 22, 2025Updated 9 months ago
- Tools to install w3af as a Python module☆10Jul 24, 2015Updated 10 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Books, advice notes, and useful lists, written for people running and working on disinformation deployments☆16Mar 11, 2021Updated 4 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆13Jun 13, 2023Updated 2 years ago