PatrowlHears - Vulnerability Intelligence Center / Exploits
☆166Mar 14, 2026Updated last week
Alternatives and similar repositories for PatrowlHears
Users that are interested in PatrowlHears are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆634Mar 10, 2026Updated last week
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆141Updated this week
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆245Mar 14, 2026Updated last week
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Fast browser-based network discovery module☆115May 26, 2021Updated 4 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆187Oct 30, 2021Updated 4 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Sep 27, 2022Updated 3 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,254Mar 5, 2026Updated 2 weeks ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Create actionable data from your Vulnerability Scans☆1,396Dec 27, 2022Updated 3 years ago
- A query aggregator for OSINT based threat hunting☆932Mar 7, 2026Updated 2 weeks ago
- A set of Zeek scripts to detect ATT&CK techniques.☆622Jun 26, 2024Updated last year
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Jan 12, 2026Updated 2 months ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- REST API backend for Reconmap☆47Mar 15, 2026Updated last week
- This script helps to identify CVE-2021-26855 ssrf Poc☆22Mar 10, 2021Updated 5 years ago
- ATTPwn☆218Mar 9, 2024Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- Vulnerability Intelligence Platform☆2,573Updated this week
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆946May 28, 2021Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- A modular OSINT honeypot for blue teamers☆342May 2, 2023Updated 2 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago