Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community.
☆74Jun 21, 2024Updated last year
Alternatives and similar repositories for YetiHunter
Users that are interested in YetiHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jan 31, 2025Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- ☆14Jan 8, 2026Updated 2 months ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- ☆75Mar 19, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆15Dec 8, 2023Updated 2 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- ☆46Nov 7, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Mar 16, 2026Updated last week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Splunk add-on related to the PurpleLab tool☆41Apr 8, 2024Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Links and useful documents from my presentations☆15May 28, 2025Updated 9 months ago
- ☆56Dec 13, 2025Updated 3 months ago
- Add a layer of active defense to your cloud applications.☆104Mar 14, 2026Updated last week
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated last week
- ☆23Sep 20, 2024Updated last year
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆51Dec 31, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Jun 20, 2025Updated 9 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Mar 18, 2026Updated last week
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- ☆18Nov 24, 2020Updated 5 years ago
- ☆27Jul 11, 2022Updated 3 years ago