refractionPOINT / limacharlieView external linksLinks
Old home of LimaCharlie, open source EDR
☆32Sep 4, 2023Updated 2 years ago
Alternatives and similar repositories for limacharlie
Users that are interested in limacharlie are comparing it to the libraries listed below
Sorting:
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 6 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Jun 10, 2021Updated 4 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- iOS Snapchat parser for chats and cached files☆21Aug 25, 2022Updated 3 years ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Easy & Flexible Alerting With ElasticSearch☆19Dec 18, 2015Updated 10 years ago
- Valhalla API Client☆70Jan 19, 2026Updated 3 weeks ago
- ☆14Jan 14, 2026Updated last month
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆29Updated this week
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆136Apr 21, 2016Updated 9 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 7 months ago
- A RESTful API frontend for Stenographer☆54Dec 7, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- No-Script Automation Tool☆56Aug 6, 2018Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Nov 19, 2024Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Nov 11, 2014Updated 11 years ago
- An Automated Network Penetration and Vulnerability Analysis Tool Written In Bash☆29Apr 6, 2022Updated 3 years ago
- A CALDERA plugin☆27Jan 28, 2026Updated 2 weeks ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago