Lateral Movement and Data Access artifacts for Velociraptor
☆17Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for Velociraptor_LMDA
Users that are interested in Velociraptor_LMDA are comparing it to the libraries listed below
Sorting:
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆13Aug 21, 2024Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- An attempt to predict price changes in Runescape using Machine Learning.☆10Aug 28, 2018Updated 7 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Feb 23, 2026Updated last week
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- ☆15Feb 7, 2025Updated last year
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- ☆11Sep 15, 2017Updated 8 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated last year
- ⏣ SecKCoin (SKC) is a cryptocurrency developed by SecKC.☆11Nov 16, 2019Updated 6 years ago
- PowerShell Script for AD Security Assessment☆17Jul 18, 2023Updated 2 years ago
- Random scripts that I used in the CARTP course lab & final exam.☆14Feb 28, 2024Updated 2 years ago
- ☆15Dec 20, 2022Updated 3 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- Various Docker Compose profiles to set up TheHive and Cortex for different use cases☆17Feb 6, 2026Updated 3 weeks ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- ☆12Feb 19, 2025Updated last year
- ☆16Nov 26, 2023Updated 2 years ago
- Script for deploying CTF tools (Linux) tested on Kali 2☆12Feb 15, 2021Updated 5 years ago
- ☆25Feb 8, 2024Updated 2 years ago
- Powering Up Incident Response with Power-Response☆63Mar 5, 2020Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆46Aug 14, 2025Updated 6 months ago
- Terminal UI Visualization for SecKC MHN Attack Map☆30Aug 20, 2025Updated 6 months ago
- just some notes on different computer science topics (linux, windows, networks, cybersecurity, machine learning...)☆19Dec 29, 2021Updated 4 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Remote video eavesdropping using a software-defined radio platform☆17Dec 5, 2017Updated 8 years ago
- iPhoneTracker port to Linux☆16Apr 22, 2011Updated 14 years ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Nov 12, 2021Updated 4 years ago
- Integration with Slack API☆15Dec 10, 2023Updated 2 years ago
- OpenAEV Docker deployment helpers☆28Updated this week
- clone of http://sourceforge.net/projects/bwapp/☆23Dec 21, 2014Updated 11 years ago
- Analysis Correlation Engine☆23Feb 8, 2022Updated 4 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- The source code for Rapid Evolution 3 from Mixshare.com☆32Nov 20, 2013Updated 12 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago