☆53May 21, 2018Updated 7 years ago
Alternatives and similar repositories for OAuthHunting
Users that are interested in OAuthHunting are comparing it to the libraries listed below
Sorting:
- ☆399Jan 7, 2026Updated last month
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 7 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆110Jan 26, 2021Updated 5 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Feb 28, 2018Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- ☆49Jan 13, 2020Updated 6 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆201Dec 11, 2017Updated 8 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Aug 12, 2024Updated last year
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated last month
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago
- ☆12Apr 5, 2025Updated 10 months ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- ☆13Nov 10, 2020Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago