IR drill plateform
☆23Jul 29, 2025Updated 8 months ago
Alternatives and similar repositories for rAIdline
Users that are interested in rAIdline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 4 months ago
- Create malware knowledge graphs from analysis reports☆40Dec 6, 2023Updated 2 years ago
- ☆15May 3, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Extract messages from a local Microsoft Teams installation☆15Jan 14, 2023Updated 3 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Living off the False Positive!☆42Apr 3, 2026Updated 2 weeks ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆114Updated this week
- A Splunk Technology Add-on to forward filtered ETW events.☆31Oct 14, 2020Updated 5 years ago
- Elastic Security Labs releases☆85Nov 24, 2025Updated 4 months ago
- Lightweight throttle layer for alloy providers☆16Mar 10, 2025Updated last year
- Terraform module to deploy a Scaleway Kapsule Kubernetes Cluster☆15Mar 7, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Living of the Land of Free SaaS☆70Mar 22, 2026Updated 3 weeks ago
- Yara Rules for Modern Malware☆79Mar 3, 2024Updated 2 years ago
- ☆39Apr 3, 2026Updated 2 weeks ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated 2 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- ☆80Sep 29, 2025Updated 6 months ago
- ☆56Apr 8, 2026Updated last week
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆112Jan 26, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Comprehensive pfSense deployment, monitoring, and security knowledge base: From basic configuration to advanced SIEM infrastructure, IDS/…☆24Mar 29, 2026Updated 3 weeks ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆34Jun 3, 2025Updated 10 months ago
- A Terraform reproducer for IngressNightmare☆26Mar 26, 2025Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Nov 5, 2025Updated 5 months ago
- SOCKS proxy written in Java☆23Oct 10, 2025Updated 6 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- yaa - yaml search for humans☆12Dec 8, 2025Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆148Feb 2, 2026Updated 2 months ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 6 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- Orchestration Software for Incident Response☆14Updated this week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 3 months ago
- ☆26Updated this week
- ☆18Updated this week