An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!
☆63Oct 28, 2023Updated 2 years ago
Alternatives and similar repositories for NightOwl
Users that are interested in NightOwl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- Forensic Artifact Collection Tool Matrix☆97Nov 9, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- ☆80Sep 29, 2025Updated 6 months ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 4 months ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Initial triage of Windows Event logs☆106Jun 16, 2024Updated last year
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Convert Sigma rules to Wazuh rules☆76Sep 13, 2025Updated 7 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- This batch script reveal all Wi-Fi passwords saved in your computer.☆18Apr 10, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Converts Sigma detection rules to a Splunk alert configuration.☆116May 18, 2020Updated 5 years ago
- Fly into Gophish with One Click (Infra Automation)☆53Mar 30, 2023Updated 3 years ago
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆77Jan 6, 2026Updated 3 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Aug 7, 2024Updated last year
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,216Dec 29, 2025Updated 3 months ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- YARA rule analyzer to improve rule quality and performance☆112Jan 18, 2026Updated 3 months ago
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 4 months ago