PowerShell tool to triage systems
☆12May 17, 2023Updated 2 years ago
Alternatives and similar repositories for Huntress
Users that are interested in Huntress are comparing it to the libraries listed below
Sorting:
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆48Nov 22, 2025Updated 3 months ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated 11 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Huntress API☆11May 26, 2022Updated 3 years ago
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- Easily browse commit history on Github☆12May 3, 2016Updated 9 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- A collection of AD, Exchange & 365 tools used by consultants while on a project☆17Feb 20, 2019Updated 7 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- A PowerShell Logging Module that uses Classes to log to the console, log file, or the event viewer☆13Sep 13, 2018Updated 7 years ago
- Add trusted device validation checks to Function Apps receiving requests from Entra ID joined devices.☆20Jan 25, 2026Updated last month
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆24Feb 2, 2026Updated last month
- [Confluence] CVE-2023-22527 realworld poc☆19Jan 23, 2024Updated 2 years ago
- A minimal SOCKS5 proxy written in C.☆12Mar 8, 2021Updated 5 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- ☆12Mar 1, 2019Updated 7 years ago
- ☆23Oct 9, 2024Updated last year
- PowerShell module to support pinning items to the Taskbar and Start Menu☆12Jan 17, 2023Updated 3 years ago
- Golang script to bypass the client-side health checks when logging into DUO protected accounts☆11Aug 26, 2023Updated 2 years ago
- ☆17Mar 18, 2024Updated 2 years ago
- Different API Hooking Techniques - Ring3 (Detours, Trampoline, IAT and EAT) for both, x64 and x32 PE files - Since 2014.☆21Jan 19, 2025Updated last year
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- ☆10Mar 15, 2017Updated 9 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- ☆12Jul 8, 2020Updated 5 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 7 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆73Aug 20, 2025Updated 7 months ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago