certsocietegenerale / rAIdlineView external linksLinks
IR drill plateform
☆23Jul 29, 2025Updated 6 months ago
Alternatives and similar repositories for rAIdline
Users that are interested in rAIdline are comparing it to the libraries listed below
Sorting:
- ☆15May 3, 2024Updated last year
- Extract messages from a local Microsoft Teams installation☆15Jan 14, 2023Updated 3 years ago
- Indicators of compromise☆17Jan 29, 2026Updated 2 weeks ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Elastic Security Labs releases☆84Nov 24, 2025Updated 2 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Mar 5, 2025Updated 11 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 8 months ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆110Jan 24, 2026Updated 3 weeks ago
- ☆78Sep 29, 2025Updated 4 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- ☆20Dec 24, 2025Updated last month
- ☆54Feb 2, 2026Updated 2 weeks ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Oct 29, 2024Updated last year
- Library to manipulate CSP reports and policies☆15Apr 18, 2014Updated 11 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated 10 months ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- Set of tools for meshtastic network visualization and analysis using a graph theory library☆14Feb 28, 2025Updated 11 months ago
- 🔎 Hunt down social media accounts by username across social networks☆10Jan 24, 2023Updated 3 years ago
- ☆11Dec 28, 2025Updated last month
- Librados Mailbox☆10Sep 1, 2016Updated 9 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- ☆16Dec 7, 2025Updated 2 months ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆17Dec 8, 2025Updated 2 months ago
- ☆13Apr 8, 2022Updated 3 years ago
- Lightweight throttle layer for alloy providers☆16Mar 10, 2025Updated 11 months ago
- A modern, reactive, open source ACI GUI☆18Nov 17, 2016Updated 9 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- brewpkg☆17Sep 30, 2025Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.☆131Apr 17, 2025Updated 9 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Nov 5, 2025Updated 3 months ago
- Merge multiple nMap xml files into one☆49May 5, 2019Updated 6 years ago
- Orchestration Software for Incident Response☆14Updated this week