Public Landing Page
☆16Jan 7, 2023Updated 3 years ago
Alternatives and similar repositories for info
Users that are interested in info are comparing it to the libraries listed below
Sorting:
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Elasticsearch / Kibana for Unifi USG and CloudKey (gen2)☆19Jun 5, 2020Updated 5 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Create machine images containing the Guacamole remote desktop gateway☆11Updated this week
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- ☆17Jul 16, 2024Updated last year
- A Powershell script for frequency analysis of separated values data files.☆17Jan 22, 2014Updated 12 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Collection of Thorrak's PCBs☆11Apr 16, 2025Updated 11 months ago
- ☆28Nov 25, 2025Updated 3 months ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- TinyCircuits TinyDuino Processor Board, Model ASM2001☆22Aug 18, 2020Updated 5 years ago
- Setup script for Red Teams☆14Apr 7, 2025Updated 11 months ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 5 years ago
- Various Docker Compose profiles to set up TheHive and Cortex for different use cases☆17Feb 6, 2026Updated last month
- Incident Response Hierarchy of Needs☆473Apr 19, 2023Updated 2 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- Splunk Add-on for Microsoft Azure☆11Dec 15, 2025Updated 3 months ago
- Security Onion Elastic Stack☆46Feb 1, 2021Updated 5 years ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 5 months ago
- AuditParser☆60Aug 28, 2013Updated 12 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Kali Linux fresh installation setup scripts.☆14Feb 10, 2017Updated 9 years ago
- Analyst tool for creating pivot maps of data sources☆16Sep 11, 2017Updated 8 years ago
- Practical Orientation Of MVISION EDR Query Language☆34Feb 10, 2023Updated 3 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- A simple and scalable iptables visualisation tool which can integrate across Kubernetes and Linux.☆21Dec 1, 2023Updated 2 years ago