It was developed to speed up the processes of SOC Analysts during analysis
☆46Mar 15, 2024Updated last year
Alternatives and similar repositories for Bryobio
Users that are interested in Bryobio are comparing it to the libraries listed below
Sorting:
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- ☆28Sep 9, 2024Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆142Sep 5, 2024Updated last year
- A Web Vulnerability Scanner and Patcher☆170Feb 14, 2026Updated 3 weeks ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- ☆109Feb 21, 2023Updated 3 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 5 months ago
- An XSS Exploitation Tool☆338Dec 5, 2025Updated 3 months ago
- CrlfiX☆21Jan 30, 2025Updated last year
- A full-featured open-source Wi-Fi fuzzer☆197Sep 30, 2025Updated 5 months ago
- PassBreaker☆66Apr 5, 2024Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- ☆132Jan 25, 2023Updated 3 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆182Feb 27, 2024Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆178Jul 30, 2024Updated last year
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago
- gRPC client for the Merlin Server☆27Apr 17, 2025Updated 10 months ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- ☆23Jun 28, 2025Updated 8 months ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago