A network logging tool that logs per process activities
☆32Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for NetDahar
Users that are interested in NetDahar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 24, 2022Updated 3 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- ☆10Feb 15, 2023Updated 3 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- FUD Linux Ransomware☆14Jan 12, 2023Updated 3 years ago
- ☆60Jun 24, 2023Updated 2 years ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated 10 months ago
- ☆160Nov 26, 2023Updated 2 years ago
- A collection of digital forensics tools for verification, investigations, diagnostics, software, libraries, learning tutorials, framework…☆33Aug 26, 2022Updated 3 years ago
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- ☆23Jun 28, 2025Updated 8 months ago
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆15Nov 21, 2025Updated 4 months ago
- General Content☆27Dec 23, 2025Updated 3 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- ☆34May 24, 2023Updated 2 years ago
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Beautify Nessus scan output☆12Dec 2, 2023Updated 2 years ago
- dynamic YAML-driven URL shortener and command mapper with real-time config updates☆20Aug 28, 2025Updated 6 months ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- ENTERPRISE LAB PROJECTS☆10Dec 24, 2024Updated last year
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- ☆12Jun 4, 2025Updated 9 months ago
- scripts to automate configuration tasks in Fortigate☆10May 1, 2015Updated 10 years ago
- Private Software-As-A-Service (SaaS) connectivity with AWS Privatelink☆25Aug 11, 2023Updated 2 years ago
- ☆56Jun 12, 2021Updated 4 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago