Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
☆29Feb 15, 2026Updated last month
Alternatives and similar repositories for Vendor-Threat-Triage-Lookup
Users that are interested in Vendor-Threat-Triage-Lookup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- LINQ to Z3 - an esoteric LINQ binding based on Bart De Smet's idea☆14Nov 23, 2021Updated 4 years ago
- Creates a counting system of radixes such as base 12 or mixed radixes such as Minutes/Hours/Days/Years (60/60/24/365)☆13May 8, 2019Updated 6 years ago
- ☆25Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆39Jul 22, 2021Updated 4 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 10 months ago
- ☆12Mar 20, 2026Updated last week
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- Wordpress theme for magazine publishing☆15Jun 28, 2011Updated 14 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆24Nov 11, 2022Updated 3 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Mar 28, 2022Updated 4 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- ☆13Dec 29, 2020Updated 5 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Using MCP is fun with Cyberbro!☆19Jan 27, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- A procedurally generated, cave-like dungeon/map creator for rogue-like games using the cellular automata method. During its development, …☆29Jun 7, 2020Updated 5 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆108Mar 4, 2021Updated 5 years ago
- Script to install the latest stable ntopng from the official ntop repo, onto a Security Onion 14.04 or 16.04 sensor☆10Jan 27, 2021Updated 5 years ago
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- Arbitrary precision rational number class☆35Mar 3, 2026Updated 3 weeks ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Python module to read KeePass 1.x/KeePassX (v3) and KeePass 2.x (v4) files☆33Mar 31, 2017Updated 8 years ago
- Arbitrary precision integers library written in pure C# with fast - about O(N * log N) - multiplication/division algorithms implementatio…☆43Mar 12, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- It decompiles target apk and adds security exception to accept all certificates thus making able to work with Burp/Charles and Other Tool…☆18Nov 22, 2020Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Load Impact Server Metrics Agent☆16Nov 23, 2016Updated 9 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- 应急响应辅助工具,根据样本hash 全盘检索☆12Sep 10, 2021Updated 4 years ago