☆24Feb 18, 2025Updated last year
Alternatives and similar repositories for CobaltSentry
Users that are interested in CobaltSentry are comparing it to the libraries listed below
Sorting:
- ☆19Sep 17, 2025Updated 5 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Updated this week
- ☆46Dec 23, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆28Sep 10, 2025Updated 5 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Feb 1, 2026Updated last month
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- A yara based MCP Server☆22Feb 23, 2026Updated last week
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆37Jan 2, 2025Updated last year
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆144Mar 16, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- ☆24Jan 24, 2025Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- ☆48Jun 6, 2025Updated 8 months ago
- ☆137Feb 11, 2025Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆341Oct 7, 2024Updated last year
- macOS Artifacts☆33Mar 2, 2025Updated last year
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆56Jun 11, 2025Updated 8 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆151Feb 25, 2025Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 9 months ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- ☆33Feb 27, 2024Updated 2 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- miscellaneous codes☆36Sep 24, 2023Updated 2 years ago