danielgottt / CyberBodegaLinks
A conglomeration of resources for any color of the rainbow
☆14Updated last year
Alternatives and similar repositories for CyberBodega
Users that are interested in CyberBodega are comparing it to the libraries listed below
Sorting:
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆11Updated 11 months ago
- All the useful tools interesting to be used☆23Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- A Darktrace CLI written in Python☆15Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 5 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆11Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- ☆21Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- Extracts Windows user info including the password hashes☆40Updated 8 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Updated 4 years ago