☆18May 31, 2022Updated 3 years ago
Alternatives and similar repositories for Expert-Rules
Users that are interested in Expert-Rules are comparing it to the libraries listed below
Sorting:
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 5 months ago
- ☆10Mar 3, 2023Updated 3 years ago
- Generates Flowchart-Visualization of Netflix Branch-Manager Data - just an experiment☆11Jan 5, 2019Updated 7 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- ☆12Feb 8, 2023Updated 3 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Code to make a Delphi program act as another user. Demo provide to access a file owned by another user.☆11Feb 8, 2022Updated 4 years ago
- ☆14Feb 7, 2019Updated 7 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- TWinEventHook allows you to hook into certain Windows events.☆11Sep 20, 2019Updated 6 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Another way to substitute environment variables in shell format strings ${FOO}, designed for k8s stuff☆13Mar 20, 2023Updated 2 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- ActiveRecord patch for Flask-SQLAlchemy models☆15Apr 10, 2018Updated 7 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- ☆12Nov 12, 2022Updated 3 years ago
- ☆12Apr 24, 2019Updated 6 years ago
- Splunk Stuffs!☆13Oct 14, 2023Updated 2 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- A Django tutorial jumping between error messages☆17Aug 31, 2014Updated 11 years ago
- ☆17Sep 15, 2017Updated 8 years ago
- Powershell script to get all user devices registered in SCCM.☆15Jul 23, 2021Updated 4 years ago
- A modified fork of Be.HexEditor for use in debug tools☆15Jan 5, 2022Updated 4 years ago
- Wizard to make Delphi Component Wrappers for Python Modules using LightWeight Python Wrappers☆12Oct 28, 2022Updated 3 years ago
- Simplifier vmp ultra☆20Dec 9, 2023Updated 2 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for b…☆13Mar 6, 2015Updated 11 years ago
- Allows injecting .NET code into another Windows process☆19Updated this week