R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker
β12Nov 5, 2024Updated last year
Alternatives and similar repositories for R3D-SSH-Hunter
Users that are interested in R3D-SSH-Hunter are comparing it to the libraries listed below
Sorting:
- KQL queries for Incident Responseβ14Oct 31, 2023Updated 2 years ago
- a common schema for internet-connected service discovery π πβ23Jan 29, 2026Updated last month
- A repository dedicated to tracking ransomware families based on leaked builders.β22Apr 17, 2024Updated last year
- reveal origins behind reverse proxies & hidden services π π§ π»β37Aug 23, 2025Updated 6 months ago
- Google Cloud Security Command Center to Azure Sentinel Connectorβ19Jul 15, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed dataβ10Mar 14, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigmaβ12Jun 20, 2024Updated last year
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CDβ10Nov 7, 2023Updated 2 years ago
- import library.zip in memory, with the interface the same as zipimport.β10Jan 10, 2026Updated last month
- β20Jan 25, 2019Updated 7 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.β12Jun 26, 2017Updated 8 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.β12Jun 4, 2018Updated 7 years ago
- β11Dec 8, 2023Updated 2 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).β13Sep 6, 2019Updated 6 years ago
- Evil Inject Finder Remote Capability and Parserβ11Nov 22, 2018Updated 7 years ago
- A scanner for taking basic fingerprintsβ50Oct 1, 2020Updated 5 years ago
- β44Feb 24, 2026Updated last week
- Some crackme i built for Androidβ12Apr 15, 2020Updated 5 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract textβ¦β12Feb 5, 2026Updated 3 weeks ago
- Modified edition of cuckooβ11Jan 12, 2016Updated 10 years ago
- Scripts to help and speed up reversing activitiesβ13Jan 12, 2026Updated last month
- Extracting AsyncRAT configuration using CyberChefβ14May 4, 2022Updated 3 years ago
- IoC Feed for security analysts etc.β13Feb 1, 2023Updated 3 years ago
- my MSTICpy practice and custom tools repositoryβ11Apr 23, 2025Updated 10 months ago
- dnsoverhttps - D'oh!β14Sep 20, 2018Updated 7 years ago
- Docker Compose Template for Single Node Airflow 3.0β18Aug 28, 2025Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β55Dec 5, 2024Updated last year
- The BXAQ malware is used in China. They force tourists to install this app at the border. The malware downloads a touristβs text messagesβ¦β10Jul 12, 2019Updated 6 years ago
- β12Jul 15, 2022Updated 3 years ago
- A collection of resources related to vulnerability management.β15Aug 8, 2023Updated 2 years ago
- Python API for generating Maltego mtgx files.β18Sep 27, 2016Updated 9 years ago
- Cerchiamo di creare la piΓΉ completa lista di wordlist italianeβ12Jun 15, 2022Updated 3 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still neβ¦β12Sep 18, 2025Updated 5 months ago
- εΊδΊι’θ±ηδΌδΈη¨ζ·εζΆιβ13Feb 3, 2020Updated 6 years ago
- Random Code Storeβ17Mar 27, 2023Updated 2 years ago
- custom Python script to perform Yara matching in Cortex XDRβ14May 18, 2021Updated 4 years ago
- Script to chain search parameters for MalwareBazaarβ13Jan 26, 2025Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β62Jul 18, 2024Updated last year
- A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.β15Aug 4, 2021Updated 4 years ago