Cyber threat intelligence tool suite.
☆42Apr 3, 2025Updated 11 months ago
Alternatives and similar repositories for varalyze
Users that are interested in varalyze are comparing it to the libraries listed below
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 3 weeks ago
- Persist like a Dodder☆68May 19, 2025Updated 9 months ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆58Jan 8, 2024Updated 2 years ago
- ☆18Feb 2, 2026Updated last month
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Honeypot Service Simulator☆22Sep 9, 2024Updated last year
- PE .exe packer and manual loader for Windows with compression, encryption, and much more☆55Sep 5, 2025Updated 6 months ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆23Mar 4, 2025Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Jun 10, 2025Updated 8 months ago
- Repo of the SQL database from the LockBit panel being hacked.☆32May 7, 2025Updated 10 months ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 8 months ago
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- An uploader honeypot designed to look like poor website security.☆28Apr 19, 2025Updated 10 months ago
- Aftermath is a free macOS incident response framework☆34Sep 25, 2025Updated 5 months ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 6 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- Various tools used to monitor and troubleshoot Azure Sentinel data☆31Oct 24, 2024Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Dec 2, 2021Updated 4 years ago
- ☆61Jun 18, 2025Updated 8 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Updated this week
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- A curated list of Awesome Threat Intelligence blogs☆104Jul 8, 2023Updated 2 years ago
- ☆82Apr 28, 2025Updated 10 months ago
- ☆29May 8, 2021Updated 4 years ago
- ☆35Nov 11, 2025Updated 3 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆179Jan 20, 2026Updated last month
- ☆37Dec 17, 2020Updated 5 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago