Menu for Thor scanner lite
☆20Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for Thor-scanner-menu
Users that are interested in Thor-scanner-menu are comparing it to the libraries listed below
Sorting:
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆41Jun 10, 2025Updated 8 months ago
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated last week
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- A preconfigured Velociraptor triage collector☆76Feb 16, 2026Updated 2 weeks ago
- ☆22Jan 31, 2023Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆42Updated this week
- THOR Thunderstorm Collectors☆25Feb 26, 2026Updated last week
- Pipeline that allows sending forensic artifacts to OpenRelik for automatic processing☆40Jan 30, 2026Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77May 21, 2024Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- Aerospace Village Badge 2020☆28Jun 5, 2023Updated 2 years ago
- Educational cybersecurity tool that visualizes network attacks on a 3D ASCII globe. Real-time firewall log analysis with IP geolocation…☆104Oct 14, 2025Updated 4 months ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- ☆11Apr 25, 2021Updated 4 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- An esphome config running the game of life on a 8x32 led matrix controlled by max7219☆22Jan 5, 2026Updated 2 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- Quickly manage DNS records for domains owned within GoDaddy, Namecheap and Route53☆11Jul 19, 2021Updated 4 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- CodeMash 2023 - resources for Automating Almost All Application Security Things with CI/CD -- Even Honeypots!☆13Jan 12, 2023Updated 3 years ago
- ☆12Aug 18, 2020Updated 5 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated last month
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆11May 2, 2022Updated 3 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated 11 months ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 8 months ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Open-source pedestal frame design files for cockpit build.☆35Feb 11, 2026Updated 3 weeks ago