Search a filesystem for indicators of compromise (IoC).
☆83Dec 30, 2025Updated 2 months ago
Alternatives and similar repositories for ioc-scanner
Users that are interested in ioc-scanner are comparing it to the libraries listed below
Sorting:
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Mar 11, 2026Updated last week
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated 3 weeks ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last month
- Test a host for susceptibility to CVE-2019-19781☆109Oct 23, 2020Updated 5 years ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Updated this week
- Create machine images containing the Nessus vulnerability scanner☆13Mar 13, 2026Updated last week
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Cybersecurity Evaluation Tool☆1,781Updated this week
- A skeleton project for quickly getting a new cisagov Python library started.☆30Mar 10, 2026Updated last week
- A set of guidelines and best practices for an awesome engineering team☆270Feb 25, 2026Updated 3 weeks ago
- Fork of OpenSearch Dashboards Security Plugin.☆12Mar 13, 2026Updated last week
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated last month
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Gather domains as a precursor to scanning☆21Feb 18, 2026Updated last month
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- ☆19Mar 10, 2026Updated last week
- ☆12Apr 14, 2017Updated 8 years ago
- A DFIR tool written in Python.☆1,052Jun 9, 2021Updated 4 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 8 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,429Dec 27, 2022Updated 3 years ago
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Jun 13, 2023Updated 2 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- General Content☆27Dec 23, 2025Updated 2 months ago
- This will create a health report for every machines in an MSP/EDB/Single Sophos Central console☆14Nov 11, 2025Updated 4 months ago
- ☆14Feb 10, 2021Updated 5 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Mar 9, 2026Updated last week
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Clean Browser Caches and All Users Recycle Bins☆32Sep 24, 2025Updated 5 months ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- The Oracle – The World's First AI Agent That Sees The Web, Right From Your Terminal. It searches the web, sees images & charts, and cites…☆25Jul 7, 2025Updated 8 months ago
- A PowerShell module with a variety of timer and countdown functions.☆26Aug 21, 2025Updated 6 months ago
- ☆11Jan 7, 2022Updated 4 years ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆952Feb 11, 2026Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 5 months ago
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Collection of useful AutoIT-Scripts☆13May 12, 2024Updated last year
- Quick and dirty script to parse bplists with Ruby☆14Oct 29, 2020Updated 5 years ago