IR drill plateform
☆23Jul 29, 2025Updated 7 months ago
Alternatives and similar repositories for rAIdline
Users that are interested in rAIdline are comparing it to the libraries listed below
Sorting:
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- ☆15May 3, 2024Updated last year
- Extract messages from a local Microsoft Teams installation☆15Jan 14, 2023Updated 3 years ago
- Create malware knowledge graphs from analysis reports☆39Dec 6, 2023Updated 2 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- ☆38Mar 1, 2026Updated last week
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 9 months ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆111Jan 24, 2026Updated last month
- ☆78Sep 29, 2025Updated 5 months ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- ☆20Feb 25, 2026Updated last week
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- ☆54Updated this week
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated 10 months ago
- A modern, reactive, open source ACI GUI☆18Nov 17, 2016Updated 9 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- 🔎 Hunt down social media accounts by username across social networks☆10Jan 24, 2023Updated 3 years ago
- Set of tools for meshtastic network visualization and analysis using a graph theory library☆16Feb 28, 2025Updated last year
- brewpkg☆17Sep 30, 2025Updated 5 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Librados Mailbox☆10Sep 1, 2016Updated 9 years ago
- ☆11Dec 28, 2025Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Nov 5, 2025Updated 4 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- Malware-Analysis-Kit☆14Aug 3, 2015Updated 10 years ago
- This hosts all queries created on the LD&R Forum☆13Feb 18, 2025Updated last year
- This project is an almost one-to-one copy of the original cheatloader by gamesense in C#.☆10Dec 28, 2022Updated 3 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- See the unseen. This program visualizes radioactive traces, turning invisible pathways into vibrant maps.☆12Updated this week
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago