☆32Mar 11, 2026Updated 2 weeks ago
Alternatives and similar repositories for Pikabot
Users that are interested in Pikabot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Jan 19, 2026Updated 2 months ago
- ☆78Sep 29, 2025Updated 6 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ☆53Apr 19, 2023Updated 2 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆512Oct 7, 2024Updated last year
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- ☆26Dec 7, 2019Updated 6 years ago
- ☆25Jul 7, 2023Updated 2 years ago
- GitHub landing page repo☆12Feb 18, 2026Updated last month
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- bash poc scripts to exploit open fpm ports☆59Jul 31, 2019Updated 6 years ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 4 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- ☆34May 18, 2023Updated 2 years ago
- Just my findings of malwares☆42Aug 26, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆253Jul 31, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- ☆15May 3, 2024Updated last year
- ☆194Feb 6, 2024Updated 2 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- ☆15Oct 29, 2024Updated last year
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆33Mar 21, 2023Updated 3 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- GreyNoise Maltego integration and transforms☆19Mar 14, 2023Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago