A GUI to query the API of abuse.ch.
☆69Jul 10, 2022Updated 3 years ago
Alternatives and similar repositories for abuselookup-gui
Users that are interested in abuselookup-gui are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Apr 8, 2026Updated 3 weeks ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- ☆47Oct 27, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- ☆54May 14, 2024Updated last year
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- Infrastructure Automation☆359Apr 12, 2024Updated 2 years ago
- ☆14May 30, 2018Updated 7 years ago
- A ProcessMonitor visualization application written in rust.☆185Aug 6, 2023Updated 2 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆121Oct 8, 2023Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 4 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 5 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- ☆23Nov 29, 2023Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Dec 2, 2020Updated 5 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18Updated this week
- Evtx Log (xml) Browser☆59Mar 12, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 10 months ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆99Apr 7, 2026Updated 3 weeks ago
- Cyber Incident Response Team Playbook Battle Cards☆430May 10, 2024Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- ☆12Jun 29, 2021Updated 4 years ago