RiverGumSecurity / RegEx
☆21Updated 3 years ago
Alternatives and similar repositories for RegEx:
Users that are interested in RegEx are comparing it to the libraries listed below
- Bloodhound Portable for Windows☆51Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆26Updated 8 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆15Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆25Updated last year
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- ☆46Updated 2 weeks ago
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated last week
- VTC - Velociraptor Timeline Creator☆15Updated 10 months ago
- CSIRT Jump Bag☆26Updated 11 months ago
- ESXi Cyber Security Incident Response Script☆23Updated 6 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- A tool to display Windows Event logs as they happen.☆12Updated last year
- Hunt for SQLite files used by various applications☆23Updated this week
- ☆34Updated last year
- Project to Support The Hunter's Framework (THF)☆11Updated 11 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆22Updated 8 months ago
- ☆24Updated 2 years ago