mttaggart / electron-app-tracker
☆32Updated last year
Alternatives and similar repositories for electron-app-tracker:
Users that are interested in electron-app-tracker are comparing it to the libraries listed below
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆32Updated this week
- ☆79Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆139Updated this week
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 2 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆102Updated 4 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆149Updated last year
- LDAP Querying without the Suck☆98Updated 3 months ago
- High signal information security sources Goggle.☆67Updated last year
- Active C&C Detector☆152Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆150Updated 3 years ago
- Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" ma…☆453Updated 2 months ago
- ☆24Updated 2 years ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 8 months ago
- A collection of tools to interact with Microsoft Security Response Center API☆95Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆156Updated 3 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.☆20Updated last year
- tool for identifying guest relationships between companies☆84Updated 7 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 8 months ago
- Rules generated from our investigations.☆193Updated 3 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 4 months ago
- LotL RMM☆128Updated last week
- ☆40Updated 5 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆41Updated last week
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated 7 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆249Updated last year