SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as Elastic.
☆55Dec 5, 2024Updated last year
Alternatives and similar repositories for subcrawl
Users that are interested in subcrawl are comparing it to the libraries listed below
Sorting:
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆170Jul 20, 2024Updated last year
- ☆27Nov 26, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆105Dec 9, 2025Updated 2 months ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- ☆44Feb 24, 2026Updated last week
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- ☆11May 13, 2024Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- Everything related to YARA☆16Feb 19, 2026Updated last week
- ☆12Jul 15, 2022Updated 3 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Apr 14, 2024Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Jul 19, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- ☆16Mar 29, 2024Updated last year
- Tool to hack Graphql☆15Oct 17, 2023Updated 2 years ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆68Dec 7, 2025Updated 2 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- This page should help you with the recon for security issues.☆20Oct 14, 2022Updated 3 years ago
- NoSQL Injection Demo Application☆13Oct 18, 2013Updated 12 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Experimental Bro scripts with good prospects for the official bro-scripts repository.☆20Nov 2, 2017Updated 8 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Jun 18, 2024Updated last year