srlabs / black-basta-busterLinks
☆99Updated last year
Alternatives and similar repositories for black-basta-buster
Users that are interested in black-basta-buster are comparing it to the libraries listed below
Sorting:
- Knowledge base on cybercriminal concealment techniques☆72Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- ☆143Updated 3 weeks ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆75Updated last week
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- Signature based honeypot detector tool written in Golang☆97Updated 3 months ago
- A repository of credential stealer formats☆218Updated 2 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 9 months ago
- Traps web spiders☆75Updated 5 years ago
- NOVA: The Prompt Pattern Matching☆123Updated 2 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆104Updated this week
- CLI tools for forensic investigation of Windows artifacts☆342Updated 7 months ago
- A tool for mapping cyber crime☆145Updated 2 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆80Updated last week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆100Updated 10 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆72Updated last year
- ☆102Updated 2 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆257Updated 2 weeks ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆76Updated last year
- A tool to use novel locations to extract metadata from Office documents.☆62Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- Canary Detection☆182Updated last month