A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analysis and forensic investigation capabilities.
☆48Jul 17, 2025Updated 7 months ago
Alternatives and similar repositories for Garuda-framework
Users that are interested in Garuda-framework are comparing it to the libraries listed below
Sorting:
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆21Feb 15, 2021Updated 5 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆30Jul 7, 2025Updated 7 months ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆11May 8, 2020Updated 5 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆93Apr 23, 2025Updated 10 months ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Jul 7, 2025Updated 7 months ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆12Nov 15, 2021Updated 4 years ago
- ☆12Dec 15, 2024Updated last year
- Code samples showing how to include data stored in Backblaze B2 in a RAG application☆11Sep 18, 2024Updated last year
- Simple terminal interface for chatgpt☆10Dec 6, 2022Updated 3 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Stream your PC audio in real-time to any device over LAN (Browser based, WASAPI loopback)☆34Nov 4, 2025Updated 3 months ago
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆13Sep 14, 2021Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Work on IoT Semantic/Hypermedia Interoperability☆10Jun 27, 2022Updated 3 years ago
- IBM iQuHACK 2024 In-Person Challenge☆13Feb 6, 2024Updated 2 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago