brayden031 / varalyzeView external linksLinks
Cyber threat intelligence tool suite.
☆42Apr 3, 2025Updated 10 months ago
Alternatives and similar repositories for varalyze
Users that are interested in varalyze are comparing it to the libraries listed below
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Oct 29, 2024Updated last year
- Persist like a Dodder☆67May 19, 2025Updated 8 months ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆57Jan 8, 2024Updated 2 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Sep 4, 2023Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆23Mar 4, 2025Updated 11 months ago
- PE .exe packer and manual loader for Windows with compression, encryption, and much more☆51Sep 5, 2025Updated 5 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Jun 10, 2025Updated 8 months ago
- Repo of the SQL database from the LockBit panel being hacked.☆32May 7, 2025Updated 9 months ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- The terminal automation framework☆41May 28, 2025Updated 8 months ago
- USN Journal full path builder☆65Sep 16, 2024Updated last year
- An uploader honeypot designed to look like poor website security.☆28Apr 19, 2025Updated 9 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆32Jan 30, 2026Updated 2 weeks ago
- MSIX Building Made Easy for Defenders☆59Aug 25, 2025Updated 5 months ago
- Aftermath is a free macOS incident response framework☆34Sep 25, 2025Updated 4 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 8 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- Various tools used to monitor and troubleshoot Azure Sentinel data☆31Oct 24, 2024Updated last year
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆64Updated this week
- ☆76Nov 27, 2025Updated 2 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆457Oct 29, 2025Updated 3 months ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Dec 2, 2021Updated 4 years ago
- ☆60Jun 18, 2025Updated 7 months ago
- A curated list of Awesome Threat Intelligence blogs☆99Jul 8, 2023Updated 2 years ago
- ☆29May 8, 2021Updated 4 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 8 months ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆179Jan 20, 2026Updated 3 weeks ago
- ☆37Dec 17, 2020Updated 5 years ago
- A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.☆51Feb 8, 2026Updated last week
- A TypeScript library to parse ChordPro songs☆13Jun 15, 2025Updated 8 months ago
- Engineering Guidance and Standards for the Home Office☆21Feb 4, 2026Updated last week
- Deploy your DNS configuration using GitHub Actions using DNSControl.☆11Jan 9, 2025Updated last year
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago