Extracting IoC data from eMail
☆141Jan 5, 2026Updated 2 months ago
Alternatives and similar repositories for meioc
Users that are interested in meioc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 6 years ago
- Facebook OSINT Collection and Analysis Tool☆54Jan 6, 2020Updated 6 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- An application to analyze the EML file☆343Mar 21, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Find potential DLL Sideloads on your windows computer☆220Jan 12, 2025Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Browser Reviewer is a portable forensic tool for analyzing user activity in Firefox and Chrome-based browsers. It extracts and displays b…☆55Oct 10, 2025Updated 5 months ago
- Tool for searching information via Telegram, Number Phone and Username.☆32Apr 30, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Apr 4, 2019Updated 6 years ago
- Monitor areas on static map services & log new images☆23Aug 22, 2019Updated 6 years ago
- Convert your shellcode into an ASCII string☆126Jun 27, 2025Updated 9 months ago
- c2 traffic☆195Feb 6, 2023Updated 3 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 10 months ago
- Documentation about ReaQta DeStra® Engine☆11Feb 7, 2022Updated 4 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Maltego transformation for TON investigations☆24Jan 1, 2024Updated 2 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- ☆28Nov 25, 2025Updated 4 months ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆12Jun 19, 2024Updated last year
- ☆20Jan 14, 2026Updated 2 months ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 7 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- PowerShell module for Office 365 and Azure log collection☆280Sep 22, 2025Updated 6 months ago
- DFIR Timeline Analysis for macOS — SQLite-backed viewer for CSV, TSV, XLSX, EVTX, Plaso, $MFT, and $J files with built-in process inspect…☆217Mar 21, 2026Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Website crawler with YARA detection☆89Aug 20, 2023Updated 2 years ago
- ☆13Dec 15, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year