kavat / anubiLinks
IOC/Hash scanner and IDS layer 4 designed to be portable and fast
☆27Updated 2 weeks ago
Alternatives and similar repositories for anubi
Users that are interested in anubi are comparing it to the libraries listed below
Sorting:
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 11 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Updated 4 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- ☆35Updated 2 years ago
- ☆18Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Updated 7 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 5 months ago
- ☆31Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 3 years ago
- ☆33Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Repo of the SQL database from the LockBit panel being hacked.☆32Updated 9 months ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- ☆20Updated 2 weeks ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- ☆76Updated last year
- ☆59Updated 2 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Updated 10 months ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago