More Obvious Webmalware Repository
☆16Dec 16, 2016Updated 9 years ago
Alternatives and similar repositories for mowr
Users that are interested in mowr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Live events map as a Kibana plugin☆76Aug 10, 2017Updated 8 years ago
- Learn x64 assembly by making games!☆20Jun 15, 2025Updated 11 months ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- PHP CLI Virus/Malware Scanner☆27Feb 28, 2019Updated 7 years ago
- ☆15Apr 24, 2026Updated 3 weeks ago
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 6 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- Incident Response Scripts☆30Mar 1, 2020Updated 6 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 8 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Reconstruct process trees from event logs☆148Aug 12, 2020Updated 5 years ago
- Disables all WordPress updates, including core, plugin and theme update checks.☆10Jul 18, 2021Updated 4 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 5 months ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [Deprecated, use hypernode-docker instead] Use Hypernode on your local machine!☆50Feb 21, 2020Updated 6 years ago
- Patched version of this ralink driver to handle sk_buff structures properly on 64-bit systems☆25Nov 25, 2017Updated 8 years ago
- Credentials recovery project☆11May 12, 2015Updated 11 years ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated 2 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Demo: https://diafygi.github.io/myLock/☆16Jul 28, 2014Updated 11 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- A fuzzy file finding Light Table plugin with style.☆32Sep 2, 2014Updated 11 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- ☆50Apr 10, 2016Updated 10 years ago
- A collection of scripts I use for hacking on container stuff like the linux kernel.☆13Apr 1, 2026Updated last month
- ☆14Dec 5, 2014Updated 11 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- Web Application for domain name monitoring / alerting☆66Aug 1, 2024Updated last year