Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks
☆25Aug 8, 2020Updated 5 years ago
Alternatives and similar repositories for LokiX
Users that are interested in LokiX are comparing it to the libraries listed below
Sorting:
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Sep 21, 2023Updated 2 years ago
- Winterfell is a group of windows batch scripts to collect Windows forensics data and perform efficient, and fast incident response and th…☆52Jul 23, 2020Updated 5 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Scripts for MacOS related tasks.☆18Feb 16, 2020Updated 6 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆209Oct 19, 2020Updated 5 years ago
- Fast, inline geolocation decoration of IPv4 and IPv6 addresses written in Rust☆29Updated this week
- Hack any Instagram account through bruteforce.☆10Sep 24, 2021Updated 4 years ago
- ☆12Apr 8, 2022Updated 3 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- ☆53Mar 8, 2021Updated 4 years ago
- CTF write-ups 2015☆19Jun 27, 2023Updated 2 years ago
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 3, 2023Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- ☆10Oct 8, 2018Updated 7 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- How to create stickers and files for creating stickers☆32Dec 31, 2023Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- ☆152Jun 5, 2024Updated last year
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- Resolvn Threat Hunting Virtual Machine☆139Aug 16, 2019Updated 6 years ago
- Node.js library for sending message through Whatsapp Business API☆11Apr 24, 2021Updated 4 years ago
- ☆93Jul 30, 2025Updated 7 months ago
- My home server infrastructure as code☆16Updated this week
- DEFCON 26 Flying Skull Badge☆13Jun 6, 2021Updated 4 years ago
- A Windows registry file parser written in Rust☆41Oct 30, 2025Updated 4 months ago
- OWASP Kubernetes Security Testing Guide☆41Dec 22, 2025Updated 2 months ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- go client for the wazuh rest api☆12Nov 1, 2025Updated 4 months ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- ☆11Jun 5, 2022Updated 3 years ago