☆14Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for socgholish_finder
Users that are interested in socgholish_finder are comparing it to the libraries listed below
Sorting:
- yaa - yaml search for humans☆12Dec 8, 2025Updated 3 months ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 4 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆96May 5, 2025Updated 10 months ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- ☆105Jul 5, 2025Updated 8 months ago
- SPL cheatsheet for Splunk.☆26Dec 2, 2022Updated 3 years ago
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- Ultimate Applocker Hardening Configuration Script.☆35Jul 26, 2024Updated last year
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆76Jan 19, 2026Updated last month
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Ground Penetrating Radar data processing and classification to detect buried objects in the ground☆16Jul 7, 2023Updated 2 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 3 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 10 years ago
- ☆10May 8, 2018Updated 7 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated last week
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- ☆19Jan 8, 2026Updated 2 months ago