Automation tool for Windows Deception Host Burn-In
☆86Dec 4, 2024Updated last year
Alternatives and similar repositories for sinon
Users that are interested in sinon are comparing it to the libraries listed below
Sorting:
- ☆75Mar 19, 2025Updated 11 months ago
- Deep Linux runtime visibility meets Wireshark☆304Nov 13, 2025Updated 3 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- ☆46Jan 14, 2026Updated last month
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆433Feb 5, 2026Updated 3 weeks ago
- Open Adversarial Exposure Validation Platform☆1,629Updated this week
- ☆15Jul 20, 2022Updated 3 years ago
- Examine Chrome extensions for security issues☆95Nov 16, 2025Updated 3 months ago
- ☆22Aug 29, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Splunk add-on related to the PurpleLab tool☆41Apr 8, 2024Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 3 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Jan 28, 2025Updated last year
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Apr 10, 2024Updated last year
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- Aranya user library, daemon, and policy code☆194Feb 20, 2026Updated last week
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆10Aug 9, 2024Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- Generate test data that is not only realistic but also contextually meaningful☆27Jun 30, 2023Updated 2 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Sep 21, 2024Updated last year
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆809Sep 3, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆725Feb 14, 2026Updated 2 weeks ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 3 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆14Mar 27, 2024Updated last year
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆30Oct 15, 2025Updated 4 months ago
- ☆11Oct 17, 2020Updated 5 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago