karimhabush / cyberowlView external linksLinks
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
☆257Feb 14, 2024Updated 2 years ago
Alternatives and similar repositories for cyberowl
Users that are interested in cyberowl are comparing it to the libraries listed below
Sorting:
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324May 1, 2025Updated 9 months ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- ☆19Mar 23, 2021Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 2 months ago
- ☆35Jan 13, 2026Updated last month
- ☆185Updated this week
- AIL framework - Analysis Information Leak framework☆878Feb 4, 2026Updated last week
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆749Oct 25, 2025Updated 3 months ago
- CQ, a code security scanner☆99May 14, 2024Updated last year
- Static Token And Credential Scanner☆95May 8, 2023Updated 2 years ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆744Dec 8, 2025Updated 2 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Python library for threat intelligence☆93Jan 14, 2025Updated last year
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Oct 27, 2020Updated 5 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- ☆21Jul 7, 2023Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- ☆42Apr 5, 2025Updated 10 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated 11 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,049Nov 9, 2024Updated last year
- Retrieve AD accounts description and search for password in it☆82Jul 21, 2022Updated 3 years ago
- Incident Response - Fast suspicious file finder☆249Jan 24, 2026Updated 3 weeks ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- Source code of exploiting windows API for red teaming series☆150Sep 25, 2022Updated 3 years ago
- SMBeagle - Fileshare auditing tool.☆744Nov 4, 2025Updated 3 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Mar 16, 2023Updated 2 years ago