Willian-2-0-0-1 / Hacker-s-Tools-Links
☆17Updated 3 years ago
Alternatives and similar repositories for Hacker-s-Tools-
Users that are interested in Hacker-s-Tools- are comparing it to the libraries listed below
Sorting:
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 2 years ago
- ☆34Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆33Updated last year
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- ☆32Updated 2 years ago
- ☆21Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- ☆47Updated 4 months ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- Sniffing out well-known threat groups☆55Updated last year
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- ☆13Updated 2 years ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆49Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 8 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 2 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Resources for AD penetration testing and security☆32Updated 3 years ago