mandiant / citrix-ioc-scanner-cve-2023-3519View external linksLinks
☆66Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for citrix-ioc-scanner-cve-2023-3519
Users that are interested in citrix-ioc-scanner-cve-2023-3519 are comparing it to the libraries listed below
Sorting:
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆77Dec 15, 2025Updated 2 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆41Nov 7, 2023Updated 2 years ago
- ☆92Jul 30, 2025Updated 6 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆214Updated this week
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- ☆22Jul 7, 2023Updated 2 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- PowerShell module for Office 365 and Azure log collection☆280Sep 22, 2025Updated 4 months ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- ☆12Feb 24, 2023Updated 2 years ago
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- Signatures and IoCs from public Volexity blog posts.☆363Dec 4, 2025Updated 2 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Repository of public reference frameworks for the DFIR community.☆121Jul 4, 2023Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month