Tiny proof-of-concept PowerShell script to do threat hunting using ChatGPT (text-davinci-003)
☆28Feb 14, 2023Updated 3 years ago
Alternatives and similar repositories for HuntWithChatGPT
Users that are interested in HuntWithChatGPT are comparing it to the libraries listed below
Sorting:
- ☆14Mar 6, 2025Updated last year
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆33Sep 28, 2022Updated 3 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- ☆18Oct 15, 2025Updated 4 months ago
- Hatching Triage public command-line utility and API library.☆75Oct 9, 2023Updated 2 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 10 months ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Nonprofit Virtual Assistant☆13Mar 17, 2025Updated 11 months ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Battery Historian is a tool to analyze battery consumers using Android "bugreport" files.☆12Nov 4, 2016Updated 9 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- Cloud Gaming Made Easy☆12Oct 19, 2018Updated 7 years ago
- The perf collector will capture resource utilization for a database server and create a CSV file to be uploaded to the Azure SQL Database…☆11Dec 13, 2017Updated 8 years ago
- Google Bard Desktop Application (Mac, Windows and Linux)☆10Jun 7, 2023Updated 2 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated last year
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Rust SDK for Claude Code CLI - Build production-ready AI agents with type safety☆20Oct 24, 2025Updated 4 months ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Emoji Favicon Toolkit - Set your favicon to emoji using canvas & cache as /favicon.ico with service workers