☆100Dec 21, 2020Updated 5 years ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- SunBurst DGA Decode Script☆205Jan 10, 2021Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆560Jun 1, 2023Updated 2 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Quick tool for using Hybrid Analysis API on command line..☆17Dec 20, 2017Updated 8 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Oct 9, 2023Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Indicators from Unit 42 Public Reports☆728Aug 17, 2025Updated 6 months ago
- ☆48Aug 11, 2022Updated 3 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 5 months ago
- Tool for rebasing a PCAP file and editing layer2 and layer 3 addresses☆16Dec 30, 2020Updated 5 years ago