Neo23x0 / Cyber-Search-ShortcutsView external linksLinks
Browser Shortcuts for Cyber Security Related Online Services
☆78Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for Cyber-Search-Shortcuts
Users that are interested in Cyber-Search-Shortcuts are comparing it to the libraries listed below
Sorting:
- ☆24Sep 28, 2022Updated 3 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- A YARA Rule Performance Measurement Tool☆61Feb 26, 2024Updated last year
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- ☆19Mar 31, 2022Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58May 25, 2020Updated 5 years ago
- A guide on how to write fast and memory friendly YARA rules☆164Feb 11, 2025Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- A command line utility for pattern matching similar to 'grep', but supports capture groups and multiline matches.☆19May 25, 2012Updated 13 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 3 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- ☆215Jun 5, 2025Updated 8 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Jul 18, 2024Updated last year
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆36Aug 17, 2020Updated 5 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- LeakIX maintained plugins implementing the l9format golang plugin interface.☆12Dec 9, 2021Updated 4 years ago