Machine Interrogation To Identify Gaps & Techniques for Execution
☆33Jul 12, 2022Updated 3 years ago
Alternatives and similar repositories for Mitigate
Users that are interested in Mitigate are comparing it to the libraries listed below
Sorting:
- ☆14Jan 29, 2011Updated 15 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Sep 6, 2021Updated 4 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- Notes and Commands for CTFs☆22Apr 28, 2020Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago
- Tools for inspecting YARA bytecode☆21Jul 1, 2020Updated 5 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- ☆34May 14, 2018Updated 7 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- ☆74Feb 16, 2026Updated 2 weeks ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- ☆10Oct 9, 2024Updated last year
- Scripts and things.☆13Jan 23, 2026Updated last month
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆35Feb 1, 2022Updated 4 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- pySigma Splunk backend☆41Updated this week
- The Sigma command line interface based on pySigma☆178Feb 5, 2026Updated 3 weeks ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86May 22, 2023Updated 2 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- black Ip lists, dorks-collection☆16Updated this week
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- scripts used in my pentest work.☆44Jan 14, 2016Updated 10 years ago