Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.
☆19Mar 13, 2022Updated 3 years ago
Alternatives and similar repositories for Epimitheus
Users that are interested in Epimitheus are comparing it to the libraries listed below
Sorting:
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- ☆22Aug 16, 2025Updated 6 months ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Feb 20, 2026Updated last week
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 3 months ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆42Nov 3, 2025Updated 3 months ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- Lightweight Microsoft OLE file parser in pure Python☆20Oct 17, 2019Updated 6 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- API Logger for Windows Executables☆80Sep 30, 2020Updated 5 years ago
- A PowerShell function that scans for the existence of a Sticky Keys backdoor.☆24Aug 10, 2017Updated 8 years ago
- Silly proof-of-concept for a PDF chatroom☆21May 3, 2023Updated 2 years ago
- Malquarium - Modern Malware Repository☆47Feb 11, 2026Updated 2 weeks ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆24Jul 14, 2022Updated 3 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year