☆10Dec 24, 2022Updated 3 years ago
Alternatives and similar repositories for TA_tooling
Users that are interested in TA_tooling are comparing it to the libraries listed below
Sorting:
- ☆19Oct 23, 2020Updated 5 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Aug 24, 2022Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- ☆34Nov 11, 2025Updated 3 months ago
- Java代码审计学习笔记☆13Dec 20, 2024Updated last year
- Automation around Entra ID☆38Jul 21, 2025Updated 7 months ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- 通过网络资产线索(如:域名,IP地址,资产名称等),利用FOFA访问网络空间测绘数据☆11Apr 23, 2024Updated last year
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- 实现轻量级RPC框架,网络通信框架Netty、注册中心(Zookeeper、Nacos)、Java基础(注解、反射、多线程、Future、SPI 、动态代理)、自定义传输协议、多种序列化(ProtoBuf / Kyro / Hessian)、Gzip压缩、轮询、随机、一致性…☆14May 7, 2022Updated 3 years ago
- Sample queries for Advanced hunting in Microsoft Defender ATP☆38Dec 19, 2021Updated 4 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- 攻击Java Web应用-[Java Web安全]☆12Dec 10, 2019Updated 6 years ago
- Script parses Interactive Brokers trade report to aid in Finnish tax report fill☆13Jan 10, 2024Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- ☆10May 8, 2018Updated 7 years ago
- ☆96May 5, 2025Updated 9 months ago
- ☆44Jul 11, 2025Updated 7 months ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Jun 15, 2024Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- ☆23Apr 8, 2025Updated 10 months ago
- Passets 被动资产识别框架数据清洗模块。☆12Nov 26, 2020Updated 5 years ago
- 一款用Go实现的批量加载漏洞检测插件进行多线程扫描的框架。☆11Jan 20, 2024Updated 2 years ago
- EVM in python from scratch because why not☆11Aug 22, 2022Updated 3 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago
- ☆36Feb 12, 2026Updated 2 weeks ago