cisagov / ioc-scannerView external linksLinks
Search a filesystem for indicators of compromise (IoC).
☆83Dec 30, 2025Updated last month
Alternatives and similar repositories for ioc-scanner
Users that are interested in ioc-scanner are comparing it to the libraries listed below
Sorting:
- A tool for detecting sensitive data in code repositories☆17Dec 15, 2025Updated last month
- A generic skeleton project for quickly getting a new cisagov project started.☆18Feb 6, 2026Updated last week
- Generate HTTPS reports based on scan data☆15Updated this week
- Fork of OpenSearch Dashboards Security Plugin.☆12Feb 6, 2026Updated last week
- Create machine images containing the Nessus vulnerability scanner☆13Dec 11, 2025Updated 2 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 2 months ago
- A PowerShell module with a variety of timer and countdown functions.☆25Aug 21, 2025Updated 5 months ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Updated this week
- Helpful tools for interacting with a GoPhish phishing instance☆49Feb 3, 2026Updated last week
- Cybersecurity Evaluation Tool☆1,763Feb 6, 2026Updated last week
- PSSI (Python Simple Smartcard Interpreter) is a Python script that provides an abstract layer for smartcard reading. Thanks to it, it is …☆23Dec 2, 2023Updated 2 years ago
- Scan domains and return data based on trustworthy email best practices☆216Dec 31, 2025Updated last month
- ☆23Dec 16, 2020Updated 5 years ago
- ☆25Feb 2, 2026Updated last week
- Scan domains and return data based on HTTPS best practices☆688Dec 31, 2025Updated last month
- Learn how to connect raspberry pi to laptop wirelessly. Share your raspberry pi screen on laptop and control it with laptop mouse and key…☆11Jul 4, 2021Updated 4 years ago
- Automated pshtt, trustymail, and sslyze scanning☆28Updated this week
- A Windows PowerShell module with a set of commands for managing scheduled jobs.☆36Oct 17, 2024Updated last year
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated last year
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,432Dec 27, 2022Updated 3 years ago
- Pumilio: A Web-Based Management System for Ecological Recordings☆13Oct 29, 2018Updated 7 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- A DFIR tool written in Python.☆1,053Jun 9, 2021Updated 4 years ago
- PowerShell functions for Windows Forms controls☆79Aug 20, 2016Updated 9 years ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆944Updated this week
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Just return HTTP status code 200.☆10Aug 2, 2018Updated 7 years ago
- PKCS#11 Private Key Extractor☆11May 7, 2017Updated 8 years ago
- Reading GEDCOM files with R☆10Sep 18, 2025Updated 4 months ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,334Jan 30, 2026Updated 2 weeks ago
- Create missions live on your server and add them instantaneously with no reloading!☆10Dec 17, 2023Updated 2 years ago
- ☆11Jul 30, 2025Updated 6 months ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Opinionated Guard Extensions for .NET☆13Sep 16, 2021Updated 4 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated last month