A network logging tool that logs per process activities
☆32Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for NetDahar
Users that are interested in NetDahar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 24, 2022Updated 3 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- ☆10Feb 15, 2023Updated 3 years ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆22Sep 10, 2025Updated 7 months ago
- FUD Linux Ransomware☆14Jan 12, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nmap NSE scripts☆28Feb 1, 2022Updated 4 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- YouTube History Analyzer☆37Mar 27, 2026Updated last month
- An asynchronous OSINT tool for IP address intelligence that aggregates data from multiple APIs to provide accurate geolocation, network, …☆50Feb 6, 2026Updated 2 months ago
- ☆61Jun 24, 2023Updated 2 years ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated last year
- ☆159Nov 26, 2023Updated 2 years ago
- A collection of digital forensics tools for verification, investigations, diagnostics, software, libraries, learning tutorials, framework…☆33Aug 26, 2022Updated 3 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a to…☆31Jul 6, 2017Updated 8 years ago
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆15Nov 21, 2025Updated 5 months ago
- ☆23Jun 28, 2025Updated 10 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆26Dec 17, 2023Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆80Apr 17, 2026Updated 2 weeks ago
- Code and documentation for SunFounder Elite Explorer Kit☆12Apr 27, 2026Updated last week
- General Content☆27Dec 23, 2025Updated 4 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Real-time tracking of LoL (League of Legends) players activities☆19Feb 7, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- ☆34May 24, 2023Updated 2 years ago
- ☆19Dec 18, 2024Updated last year
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 10 months ago
- Beautify Nessus scan output☆12Dec 2, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- dynamic YAML-driven URL shortener and command mapper with real-time config updates☆20Aug 28, 2025Updated 8 months ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆53Jan 28, 2026Updated 3 months ago
- ENTERPRISE LAB PROJECTS☆10Dec 24, 2024Updated last year
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆14Apr 29, 2025Updated last year