RandomRhythm / Vendor-Threat-Triage-LookupView external linksLinks
Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
☆29Jan 20, 2026Updated 3 weeks ago
Alternatives and similar repositories for Vendor-Threat-Triage-Lookup
Users that are interested in Vendor-Threat-Triage-Lookup are comparing it to the libraries listed below
Sorting:
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 10 months ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Experimental tagging schema for analysis of intersectionality, bias, and reception theories.☆11Feb 21, 2024Updated last year
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Mar 25, 2024Updated last year
- Simple Controlflow Deobfuscator for .NET Reactor 6.7.0.0☆16May 27, 2021Updated 4 years ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- This is a repository to share my students who are undergoing python training under me codes of everyday lectures provided by me.☆10Apr 18, 2021Updated 4 years ago
- PowerShell for creating SSL Certificate request - Scripted by Reinout Segers☆10Apr 21, 2017Updated 8 years ago
- A minimal cross browser URL parser library☆10Apr 26, 2020Updated 5 years ago
- Play Mortal Kombat with the camera as your input device and your body/pose as a controller.☆11Jun 18, 2023Updated 2 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 10 months ago
- Sample Viva Connections cards that leverage the card designer and data JSON. Provides an alternative to custom developed cards.☆12Jul 20, 2023Updated 2 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- myTab is a simple chrome extension that overrides a new chrome tab with beautiful Wallpaper, Weather Information, Date, Time, and a Quote…☆14Apr 12, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Guichan is a C++ GUI library designed for games.☆14Oct 22, 2025Updated 3 months ago
- Wordpress theme for magazine publishing☆15Jun 28, 2011Updated 14 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- AMP (Advance Music Player) is a free, powerful and elegant music player for Android used to be a free app on the Play Store.☆15May 9, 2022Updated 3 years ago
- Content classification/clustering through language processing☆25Mar 10, 2012Updated 13 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- This software allows you to do different analyzes of your pc (hardware, software, wifi, network, speedtest...)☆11Apr 23, 2024Updated last year
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Bypass EDR Create TaskServers☆38Dec 24, 2022Updated 3 years ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- [SwiftUI] Pog can track your location regardless of application state (foreground/background/not-running)☆10Jan 20, 2024Updated 2 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- AIChat:集成ChatGPT、Midjourney、文心一言、DALL.E2。多支付和充值方式。多推广方式。多广告位。自定义会员套餐。流式响应。多种安全控制。源码版支持二开。教程完善。免费升级。联系:xiaoluobu7☆10Sep 6, 2023Updated 2 years ago
- 8-bit game system emulator☆12Jun 22, 2022Updated 3 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Example of an ELF parser to learn about the ELF format☆10Oct 6, 2024Updated last year
- Argon2 key derivation for Ruby☆11Jan 2, 2026Updated last month
- Get an answer to a question from multiple backend engine like Google, wolframalpha or DuckDuckGo☆11Dec 9, 2020Updated 5 years ago