Javascript deobfuscation tool
☆17Apr 6, 2018Updated 7 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- ☆18May 16, 2013Updated 12 years ago
- ☆28Dec 7, 2016Updated 9 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- Command line interface to Carbon Black Response☆38May 12, 2020Updated 5 years ago
- An updated C# port of X-Ways X-Tensions API.☆11Mar 12, 2018Updated 8 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Windows Defender ATP - Advanced Hunting Queries☆22Apr 12, 2018Updated 7 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- PowerShell script to perform a REST API query to get IP address geo-location information☆16Oct 21, 2018Updated 7 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- powershell_profile.ps1☆14Feb 11, 2026Updated last month
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 7 months ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- Various DTrace probes☆17Jan 23, 2013Updated 13 years ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Mar 31, 2015Updated 10 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Plugin based information gathering library☆28May 4, 2023Updated 2 years ago
- Scripts for Bro IDS and ELK Stack☆57Sep 2, 2015Updated 10 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- Check Redis instance for security vulnerabilities.☆13Sep 20, 2016Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago