Te-k / commands-for-secView external linksLinks
Useful commands for infosec
☆28Feb 13, 2023Updated 3 years ago
Alternatives and similar repositories for commands-for-sec
Users that are interested in commands-for-sec are comparing it to the libraries listed below
Sorting:
- Scripts to analyze stuff☆146Jul 22, 2025Updated 6 months ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- hcidump for android☆10Jan 28, 2015Updated 11 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Aug 27, 2014Updated 11 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Handy scripts to speed up malware analysis☆35Oct 3, 2023Updated 2 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 6 months ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- CLI tool to analyze APKs☆42Mar 28, 2024Updated last year
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Lightweight Microsoft OLE file parser in pure Python☆20Oct 17, 2019Updated 6 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- A PowerShell function that scans for the existence of a Sticky Keys backdoor.☆24Aug 10, 2017Updated 8 years ago
- Silly proof-of-concept for a PDF chatroom☆20May 3, 2023Updated 2 years ago
- Malquarium - Modern Malware Repository☆47Updated this week
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago