Fast IOC and YARA Scanner
☆90Mar 23, 2020Updated 5 years ago
Alternatives and similar repositories for thor-lite
Users that are interested in thor-lite are comparing it to the libraries listed below
Sorting:
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- Sigma rules from Joe Security☆233Nov 4, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Loki - Simple IOC and YARA Scanner☆3,733Jan 12, 2026Updated 2 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Tools and Techniques for Blue Team / Incident Response☆23Mar 8, 2023Updated 3 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Simple Bash IOC Scanner☆774Feb 12, 2022Updated 4 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- ☆13Jun 1, 2021Updated 4 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Digital Forensic Investigative Scripts☆87Updated this week
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Jan 31, 2018Updated 8 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- awvs12统一面板管理多引擎Multi-engine,一键docker部署☆14Oct 24, 2019Updated 6 years ago
- ☆22Mar 4, 2025Updated last year
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Open YARA scan- and search engine☆26Feb 23, 2025Updated last year
- An open source platform to support analysts to organise their case and tasks☆128Updated this week
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated last week
- ☆10Apr 10, 2024Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago