dutchcoders / lootbox
Lootbox downloads open directories shared on Twitter.
☆35Updated 4 years ago
Alternatives and similar repositories for lootbox:
Users that are interested in lootbox are comparing it to the libraries listed below
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- ☆50Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated 7 months ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- repo for sharing stuff☆16Updated last year
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- ☆25Updated 8 years ago
- A warehouse for your malware☆134Updated 12 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago