ShellSweeping the evil.
☆181Nov 25, 2024Updated last year
Alternatives and similar repositories for ShellSweep
Users that are interested in ShellSweep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆182Apr 17, 2026Updated last week
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 6 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆570Mar 28, 2024Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆771Apr 13, 2026Updated 2 weeks ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆820Apr 18, 2026Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Dec 29, 2023Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆706Apr 21, 2026Updated last week
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- Documentation and scripts to properly enable Windows event logs.☆694Oct 3, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Awesome list of keywords and artifacts for Threat Hunting sessions☆654Aug 4, 2025Updated 8 months ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆160May 11, 2025Updated 11 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆466Feb 18, 2026Updated 2 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated 3 weeks ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆584Apr 11, 2026Updated 2 weeks ago
- Quick ESXi Log Parser☆31Oct 20, 2025Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆153May 3, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆806Apr 6, 2026Updated 3 weeks ago
- ☆13Mar 1, 2024Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,948Updated this week
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 5 months ago
- Elastic Security detection content for Endpoint☆1,418Apr 13, 2026Updated 2 weeks ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆146Apr 10, 2024Updated 2 years ago