A tool for simplifying the process of researching IOCs.
☆25Sep 24, 2021Updated 4 years ago
Alternatives and similar repositories for ioccheck
Users that are interested in ioccheck are comparing it to the libraries listed below
Sorting:
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Nov 2, 2022Updated 3 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- ☆13Jun 10, 2022Updated 3 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Aug 30, 2022Updated 3 years ago
- A bunch of scripts I use to work with urlscan.io☆35Oct 25, 2019Updated 6 years ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Oct 26, 2022Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- SnapCrack is an Android application and web UI that is capable of crack detection and localization in real time. SnapCrack leverages basi…☆10Mar 4, 2023Updated 2 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- ReoLink Discovery Protocol Integration for Home Assistant☆12Nov 8, 2023Updated 2 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Jan 10, 2022Updated 4 years ago
- Github dorking tool☆136Mar 12, 2022Updated 3 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆15Jul 10, 2025Updated 7 months ago
- REST API for tgsint telegram bot☆10Nov 11, 2023Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- ☆11Apr 21, 2022Updated 3 years ago