Public tools, scripts or code snippets that can help when working with our products
☆46Mar 12, 2026Updated last week
Alternatives and similar repositories for nextron-helper-scripts
Users that are interested in nextron-helper-scripts are comparing it to the libraries listed below
Sorting:
- THOR Thunderstorm Collectors☆25Mar 14, 2026Updated last week
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Sep 24, 2023Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- A Delphi symbol name recovery tool for reverse engineers.☆23Jan 17, 2026Updated 2 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆87Mar 11, 2026Updated last week
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- ☆14Nov 30, 2022Updated 3 years ago
- ☆17Oct 13, 2025Updated 5 months ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆23Feb 28, 2026Updated 3 weeks ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago
- ☆17Jan 22, 2026Updated 2 months ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- ☆37Sep 30, 2021Updated 4 years ago
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated 2 months ago
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago