It was developed to speed up the processes of SOC Analysts during analysis
☆46Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for Bryobio
Users that are interested in Bryobio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Automation tool designed to simplify the analysis of PCAP (Packet Capture) files☆18Mar 15, 2024Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Maltego Local Transform to use Hybrid Analysis Public API - https://www.hybrid-analysis.com/apikeys/info☆12Sep 7, 2018Updated 7 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Simple python script for brute force attack to smtp users☆12Mar 15, 2024Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆142Sep 5, 2024Updated last year
- An XSS Exploitation Tool☆338Dec 5, 2025Updated 3 months ago
- A full-featured open-source Wi-Fi fuzzer☆199Sep 30, 2025Updated 6 months ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆28Sep 9, 2024Updated last year
- ☆109Feb 21, 2023Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆182Jul 30, 2024Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆184Feb 27, 2024Updated 2 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Aug 2, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago