C2 Active Scanner
☆58Jun 19, 2024Updated last year
Alternatives and similar repositories for NoWhere2Hide
Users that are interested in NoWhere2Hide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Sep 28, 2022Updated 3 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆143Apr 20, 2023Updated 3 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- Web Application for domain name monitoring / alerting☆66Aug 1, 2024Updated last year
- Live Feed of C2 servers, tools, and botnets☆775Apr 13, 2026Updated last month
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆52May 11, 2026Updated last week
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 11 months ago
- YARA Language Server☆74Feb 3, 2026Updated 3 months ago
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- ☆34Apr 29, 2026Updated 3 weeks ago
- Base service class from Assemblyline 4☆15May 15, 2026Updated last week
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Open KLara Project☆36Feb 12, 2026Updated 3 months ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- VirusTotal Intelligence Search☆41May 21, 2020Updated 6 years ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated 2 years ago
- Hacked up scripts to perform google searches☆16Apr 26, 2024Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- function identification signatures☆12Apr 26, 2021Updated 5 years ago
- ☆108Dec 9, 2025Updated 5 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 6 months ago
- Script to chain search parameters for MalwareBazaar☆14Jan 26, 2025Updated last year
- ☆21Apr 19, 2024Updated 2 years ago
- Everything related to YARA☆16Apr 18, 2026Updated last month
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago