🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.
☆11Jan 9, 2020Updated 6 years ago
Alternatives and similar repositories for snipehunt
Users that are interested in snipehunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Franz 5 recipe for Mastodon☆13Sep 8, 2018Updated 7 years ago
- AbuseIpDB - Wrapper around the AbuseIPDb service API☆16May 15, 2024Updated last year
- Language resources for Oqtane☆12Mar 10, 2026Updated 2 weeks ago
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Oct 19, 2021Updated 4 years ago
- Ask a directory of files questions. Powered by ChromaDB and ChatGPT☆14Aug 15, 2023Updated 2 years ago
- ☆12Dec 16, 2021Updated 4 years ago
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆20Feb 27, 2026Updated 3 weeks ago
- Server Protection monitors various system resources to detect brute force login attempts. Integrates with the Windows Firewall or Linux i…☆12Dec 8, 2022Updated 3 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- This is an automated script to scan for Log4J vulnerabilities. This is based off of the Datto script.☆14Dec 17, 2021Updated 4 years ago
- ☆78Mar 17, 2026Updated last week
- ☆21Aug 26, 2021Updated 4 years ago
- ☆13Mar 30, 2018Updated 7 years ago
- ⚡📦 A wrapper for https://gallery.technet.microsoft.com/scriptcenter/PS2EXE-GUI-Convert-e7cb69d5 - make your PowerShell scripts into exec…☆29Sep 24, 2018Updated 7 years ago
- pysnoo is a python library to interact with the SNOO Smart Sleeper Bassinet☆21Mar 13, 2023Updated 3 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- ☆14Jul 21, 2023Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- ☆21Sep 12, 2024Updated last year
- A Advanced Independent Browser Of Ethical Hackers and Cybersecurity Researchers☆24Apr 14, 2025Updated 11 months ago
- Log4Shell Enumeration, Mitigation and Attack Detection Tool☆15Jul 10, 2023Updated 2 years ago
- Fun with Powershell exercise. Using a terminal-like CTF, the players would get hands-on proficiency with Powershell☆15Aug 26, 2024Updated last year
- A collection of scripts for use with CrowdStrike Falcon RTR☆19Oct 4, 2024Updated last year
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- ☆15Mar 10, 2020Updated 6 years ago
- Contains fast-written, ugly but working scripts☆14Apr 15, 2021Updated 4 years ago
- [UAV] - [STM32F103] - 6 Axes sensor MPU6050 - Quaternion & Euler Angles Compute - PID Controller☆13Oct 17, 2016Updated 9 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41May 3, 2021Updated 4 years ago
- simple consul cluster in a compose☆18Jun 6, 2017Updated 8 years ago
- Adafruit library for LIS3MDL magnetometer☆14Nov 19, 2025Updated 4 months ago
- This repository contains all the code and configurations related to enabling Grafana Alloy to collect different types of data☆20Aug 14, 2025Updated 7 months ago
- whisperPAIR poc☆33Feb 4, 2026Updated last month
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- ☆24Mar 10, 2026Updated 2 weeks ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Apr 24, 2025Updated 11 months ago
- Rapid Azure Diagnostic deployments☆27Jan 1, 2024Updated 2 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago