shellsharks / assortedLinks
☆13Updated 3 months ago
Alternatives and similar repositories for assorted
Users that are interested in assorted are comparing it to the libraries listed below
Sorting:
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 5 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- A quick reference guide for python script development in DFIR☆17Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- ☆28Updated 5 months ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Commands used in Windows penetration tests☆53Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- Kerberoast Detection Script☆30Updated 7 months ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- Useful commands for infosec☆29Updated 2 years ago
- ☆80Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆31Updated 2 months ago
- ☆15Updated 3 years ago
- Ideaslocas Repository☆37Updated 4 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago