SANS Slingshot Linux Distribution
☆56Nov 2, 2020Updated 5 years ago
Alternatives and similar repositories for slingshot
Users that are interested in slingshot are comparing it to the libraries listed below
Sorting:
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- Repo for hugo generated files☆13Feb 4, 2026Updated last month
- ☆12Jun 6, 2025Updated 9 months ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 6 months ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆67May 27, 2021Updated 4 years ago
- List of Tor exit nodes built by CI☆15Updated this week
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- A Docker container for remote penetration testing.☆139Mar 16, 2021Updated 5 years ago
- CSV fuzzer/anonymizer☆10Feb 14, 2026Updated last month
- Dockerfiles for containerized osquery☆14May 23, 2017Updated 8 years ago
- Python 3 library to request https://crt.sh/☆36Oct 28, 2025Updated 4 months ago
- ☆11Jan 20, 2026Updated 2 months ago
- ☆128May 22, 2023Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- ☆93Jun 12, 2025Updated 9 months ago
- Python starter for the 'Build Your Own Redis' challenge☆13Oct 9, 2023Updated 2 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Python utilities related to plists☆55Oct 28, 2025Updated 4 months ago
- ☆11Aug 9, 2016Updated 9 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 5 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 4 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- # Docker Commands, Help & Tips ### Show commands & management commands ``` $ docker ``` ### Docker version info ``` $ docker version …☆18Sep 15, 2022Updated 3 years ago
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- Seed Corpus for clamav-devel oss-fuzz integration.☆34Jul 30, 2019Updated 6 years ago
- ☆11Feb 14, 2025Updated last year
- Extract files using QR Codes☆10Feb 10, 2018Updated 8 years ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- open-source intelligence gathering for SIEMs <3☆38Feb 16, 2017Updated 9 years ago