RiverGumSecurity / RegEx
☆21Updated 2 years ago
Related projects: ⓘ
- Bloodhound Portable for Windows☆51Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆22Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆29Updated 2 months ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆24Updated last year
- ☆42Updated 3 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆100Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆43Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- DEFCON 31☆57Updated 2 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆24Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- Files to automatically deploy red team Active Directory test lab☆42Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 2 years ago
- ☆18Updated 2 years ago
- ☆15Updated 2 years ago
- General Content☆19Updated 2 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆61Updated 5 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- Baseline a Windows System against LOLBAS☆22Updated 4 months ago
- Windows Security Logging☆43Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆17Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆34Updated 2 weeks ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago