Fast IOC and YARA Scanner
☆90Mar 23, 2020Updated 6 years ago
Alternatives and similar repositories for thor-lite
Users that are interested in thor-lite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Aug 10, 2022Updated 3 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 10 months ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Provides access to libhashcat☆31Apr 6, 2024Updated 2 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- Sigma rules from Joe Security☆235Nov 4, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Loki - Simple IOC and YARA Scanner☆3,742Jan 12, 2026Updated 2 months ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Tools and Techniques for Blue Team / Incident Response☆23Mar 8, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Simple Bash IOC Scanner☆777Feb 12, 2022Updated 4 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- ☆13Jun 1, 2021Updated 4 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Digital Forensic Investigative Scripts☆92Apr 2, 2026Updated last week
- awvs12统一面板管理多引擎Multi-engine,一键docker部署☆14Oct 24, 2019Updated 6 years ago
- ☆22Mar 4, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- An open source platform to support analysts to organise their case and tasks☆130Updated this week
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- YARA signature and IOC database for my scanners and tools☆2,910Updated this week
- ☆10Apr 10, 2024Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- A repo that aims to centralize a current, running list of relevant parsers/tools for known DFIR artifacts☆79Oct 20, 2025Updated 5 months ago
- ☆27Jul 25, 2025Updated 8 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 6 years ago
- ☆19Jul 29, 2022Updated 3 years ago