Fast IOC and YARA Scanner
☆92Mar 23, 2020Updated 6 years ago
Alternatives and similar repositories for thor-lite
Users that are interested in thor-lite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- THOR MITRE ATT&CK Framework Coverage☆26Jun 15, 2020Updated 5 years ago
- THOR APT Scanner User Manual☆21Apr 22, 2026Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- Simple SYSLOG client in Go☆23Jun 5, 2025Updated 10 months ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A triage data collection script for macOS☆30Nov 27, 2020Updated 5 years ago
- Sigma rules from Joe Security☆237Nov 4, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- Loki - Simple IOC and YARA Scanner☆3,748Jan 12, 2026Updated 3 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Tools and Techniques for Blue Team / Incident Response☆23Mar 8, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆69Sep 13, 2023Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Simple Bash IOC Scanner☆778Feb 12, 2022Updated 4 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- ☆13Jun 1, 2021Updated 4 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Digital Forensic Investigative Scripts☆95Apr 10, 2026Updated 3 weeks ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Jan 31, 2018Updated 8 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- awvs12统一面板管理多引擎Multi-engine,一键docker部署☆14Oct 24, 2019Updated 6 years ago
- ☆22Mar 4, 2025Updated last year
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- YARA signature and IOC database for my scanners and tools☆2,931Updated this week
- An open source platform to support analysts to organise their case and tasks☆134Updated this week
- ☆11Apr 10, 2024Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,306Jun 1, 2023Updated 2 years ago
- A repo that aims to centralize a current, running list of relevant parsers/tools for known DFIR artifacts☆80Oct 20, 2025Updated 6 months ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Open YARA scan- and search engine☆27Feb 23, 2025Updated last year