☆14Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for socgholish_finder
Users that are interested in socgholish_finder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- yaa - yaml search for humans☆12Dec 8, 2025Updated 5 months ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 4 years ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 8 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- ☆105Jul 5, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆20Oct 23, 2020Updated 5 years ago
- ☆12May 8, 2020Updated 6 years ago
- mod to myaut2exe decompiler☆19Jul 28, 2017Updated 8 years ago
- Ultimate Applocker Hardening Configuration Script.☆35Jul 26, 2024Updated last year
- ☆96Apr 8, 2026Updated last month
- Base Code for P2P Network Crawlers☆32Aug 2, 2013Updated 12 years ago
- Compilation of peHash implementations.☆15May 2, 2019Updated 7 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- Parser to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents.☆16Aug 17, 2022Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Dec 8, 2021Updated 4 years ago
- This script and accompanying files will allow system administrators to automatically deploy Microsoft Local Administrator Password Soluti…☆13Aug 18, 2017Updated 8 years ago
- Set of PoC to abuse Windows minifilters functionality☆76May 1, 2026Updated last week
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆77Jan 19, 2026Updated 3 months ago
- tools and documentation for uConsole☆12Jul 29, 2023Updated 2 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Ground Penetrating Radar data processing and classification to detect buried objects in the ground☆16Jul 7, 2023Updated 2 years ago
- Tool for extracting credentials locally stored by web browsers☆37Jun 25, 2022Updated 3 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆22Sep 20, 2018Updated 7 years ago