rjhansen / nsrlsvrView external linksLinks
☆83Nov 22, 2022Updated 3 years ago
Alternatives and similar repositories for nsrlsvr
Users that are interested in nsrlsvr are comparing it to the libraries listed below
Sorting:
- Checks with NSRL RDS servers looking for for hash matches☆114Feb 26, 2021Updated 4 years ago
- An NTFS journal parser☆80Mar 3, 2016Updated 9 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Exposing the UN/CEFACT vocabulary as web semantics☆13Sep 13, 2024Updated last year
- ☆11Aug 28, 2024Updated last year
- Manage collection of SBOMs (Software Bill of Materials)☆14Mar 25, 2024Updated last year
- ☆11Aug 17, 2023Updated 2 years ago
- A GeoDjango app to return Cascadia quake risk and resilience factors based on location☆12Updated this week
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 8 months ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- Vuln Disclosure WG's new SIG☆11Jan 2, 2024Updated 2 years ago
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Nov 4, 2021Updated 4 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- ☆17Sep 14, 2022Updated 3 years ago
- Github Artifacts server example☆12Jun 4, 2021Updated 4 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆11Nov 20, 2024Updated last year
- X-Ways C# X-Tension API☆15May 28, 2013Updated 12 years ago
- The cryptographic signature multifomat☆13Jul 9, 2025Updated 7 months ago
- ☆21Jun 20, 2025Updated 7 months ago
- Windows Offline Crash Dump☆17Aug 29, 2022Updated 3 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- Device Identifier Composition Engine☆18Mar 15, 2022Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 2 weeks ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Tiny browser for JSON APIs, especially ActivityPub☆17Feb 1, 2023Updated 3 years ago
- ☆18Mar 26, 2025Updated 10 months ago
- Mpcurses is an abstraction of the Python curses and multiprocessing libraries providing function execution and runtime visualization capa…☆17Jan 4, 2025Updated last year
- Evidence Fetcher (efetch) is a web-based file explorer, viewer, and analyzer.☆39Apr 11, 2020Updated 5 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago