☆32Mar 11, 2026Updated last month
Alternatives and similar repositories for Pikabot
Users that are interested in Pikabot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Jan 19, 2026Updated 3 months ago
- ☆81Sep 29, 2025Updated 6 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ☆53Apr 19, 2023Updated 3 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆510Oct 7, 2024Updated last year
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- ☆25Jul 7, 2023Updated 2 years ago
- GitHub landing page repo☆12Feb 18, 2026Updated 2 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- bash poc scripts to exploit open fpm ports☆59Jul 31, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 5 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year
- ☆34May 18, 2023Updated 2 years ago
- Just my findings of malwares☆42Aug 26, 2022Updated 3 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆194Feb 6, 2024Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- ☆15Oct 29, 2024Updated last year
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆34Mar 21, 2023Updated 3 years ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆112Apr 12, 2026Updated last week
- ☆15May 3, 2024Updated last year
- GreyNoise Maltego integration and transforms☆19Mar 14, 2023Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆653Aug 4, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 3 years ago
- This is a public repository to help those trying to learn Azure content and certifications to better understand the concepts and have a c…☆32Sep 28, 2023Updated 2 years ago
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆104Apr 30, 2025Updated 11 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,682Updated this week
- Just some lists of Malware Configs☆173Jan 9, 2025Updated last year