deFr0ggy / NightOwlView external linksLinks
An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!
☆63Oct 28, 2023Updated 2 years ago
Alternatives and similar repositories for NightOwl
Users that are interested in NightOwl are comparing it to the libraries listed below
Sorting:
- ☆13Aug 10, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- Packet Analysis on Steroids☆12Oct 20, 2022Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- Quick tool to create custom wordlists like how fuzzers work☆10Sep 29, 2023Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Jan 6, 2026Updated last month
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 2 months ago
- ☆78Sep 29, 2025Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 10 months ago
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- ☆18Sep 24, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- Automated Cloud Misconfiguration Testing☆23Jun 20, 2025Updated 7 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Extract C2 Traffic☆252Nov 25, 2024Updated last year
- ☆19Mar 4, 2023Updated 2 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105May 11, 2022Updated 3 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 4 months ago
- AstroCrypt is a powerful and versatile tool designed to assist you in both cracking hashed passwords and identifying the hash type used t…☆17Oct 26, 2023Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Jan 22, 2025Updated last year
- ☆61Apr 13, 2023Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 4 months ago