Permiso-io-tools / YetiHunterLinks
Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community.
☆73Updated last year
Alternatives and similar repositories for YetiHunter
Users that are interested in YetiHunter are comparing it to the libraries listed below
Sorting:
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- ☆75Updated 9 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated last week
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- Create honeypots for cloud environments☆109Updated 3 months ago
- ☆169Updated 3 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man ’s SOC.☆54Updated 2 months ago
- ☆76Updated last year
- ☆55Updated 2 years ago
- God Mode Detection Rules☆135Updated last year
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- Living Off Security Tools☆58Updated last month
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 2 months ago
- ☆18Updated this week
- ☆20Updated 9 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Updated last month
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- ☆56Updated 11 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆39Updated last week
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Open-source Fabric templates for cybersecurity and compliance☆28Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Updated 5 months ago