SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as Elastic.
☆55Dec 5, 2024Updated last year
Alternatives and similar repositories for subcrawl
Users that are interested in subcrawl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆172Jul 20, 2024Updated last year
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated last year
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆45Feb 24, 2026Updated 3 weeks ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- MISP Playbooks☆223Oct 14, 2025Updated 5 months ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Mar 12, 2026Updated last week
- ☆39Jan 24, 2024Updated 2 years ago
- Everything related to YARA☆16Feb 19, 2026Updated last month
- ☆11May 13, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Just some lists of Malware Configs☆173Jan 9, 2025Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- ☆107Dec 9, 2025Updated 3 months ago
- ☆36Jan 11, 2023Updated 3 years ago
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 7 months ago