Useful commands for infosec
☆29Feb 13, 2023Updated 3 years ago
Alternatives and similar repositories for commands-for-sec
Users that are interested in commands-for-sec are comparing it to the libraries listed below
Sorting:
- Scripts to analyze stuff☆147Jul 22, 2025Updated 7 months ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- hcidump for android☆10Jan 28, 2015Updated 11 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- CLI tool to analyze APKs☆42Mar 28, 2024Updated last year
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- A PowerShell function that scans for the existence of a Sticky Keys backdoor.☆24Aug 10, 2017Updated 8 years ago
- Silly proof-of-concept for a PDF chatroom☆21May 3, 2023Updated 2 years ago
- Malquarium - Modern Malware Repository☆47Feb 11, 2026Updated 3 weeks ago