A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration for IP reputation checks.
☆17May 11, 2025Updated 9 months ago
Alternatives and similar repositories for BeaconHunter
Users that are interested in BeaconHunter are comparing it to the libraries listed below
Sorting:
- ☆37Updated this week
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 7 years ago
- ☆24Feb 18, 2025Updated last year
- ☆100Oct 22, 2025Updated 4 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- ☆24Jan 24, 2025Updated last year
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Oct 30, 2024Updated last year
- OSCP material tools and helpful scripts.☆11Mar 14, 2025Updated 11 months ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 10 months ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated last month
- ☆12Dec 26, 2022Updated 3 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Sysmon Config Pusher - Modernized☆33Jan 7, 2026Updated last month
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- SentinelOne Windows Installation Diagnostic☆11Apr 14, 2025Updated 10 months ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆28Jan 21, 2026Updated last month
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆40Feb 27, 2026Updated last week
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago