RiverGumSecurity / RegExLinks
☆21Updated 3 years ago
Alternatives and similar repositories for RegEx
Users that are interested in RegEx are comparing it to the libraries listed below
Sorting:
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 11 months ago
- CSIRT Jump Bag☆26Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 6 months ago
- Files to automatically deploy red team Active Directory test lab☆45Updated 3 years ago
- ☆47Updated 2 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- DEFCON 31 slide deck and video link☆63Updated 3 weeks ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆26Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆23Updated 9 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- create a "simulated internet" cyber range environment☆17Updated 3 weeks ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated this week
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago