Fast IOC and YARA Scanner
☆90Mar 23, 2020Updated 5 years ago
Alternatives and similar repositories for thor-lite
Users that are interested in thor-lite are comparing it to the libraries listed below
Sorting:
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated last month
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 8 months ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆10Dec 2, 2021Updated 4 years ago
- CLI for the Akamai's mPulse Query API☆10Apr 22, 2025Updated 10 months ago
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 6 years ago
- Sigma rules from Joe Security☆232Nov 4, 2024Updated last year
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- thc-ipv6 debian package (part of https://salsa.debian.org/pkg-security-team/thc-ipv6 as of 201607)☆34Aug 3, 2017Updated 8 years ago
- A skeleton project for quickly getting a new cisagov Docker container started.☆19Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Certbot container that stores its configuration in an AWS S3 bucket☆15Feb 18, 2026Updated last week
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago