huebicode / abuselookup-gui
A GUI to query the API of abuse.ch.
☆70Updated 2 years ago
Alternatives and similar repositories for abuselookup-gui:
Users that are interested in abuselookup-gui are comparing it to the libraries listed below
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Full of public notes and Utilities☆98Updated last month
- ☆50Updated 2 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Detection rule validation☆41Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆84Updated 7 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated last month
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- Initial triage of Windows Event logs☆97Updated 9 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆68Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆119Updated 11 months ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- ESXi Cyber Security Incident Response Script☆23Updated 6 months ago
- PowerShell tool to triage systems☆12Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 weeks ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Slides of my public talks☆54Updated last year
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 11 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated 11 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year