| aptnotes/data |
1,585 |
|
0 |
0 |
over 2 years ago |
0 |
|
29 |
|
|
| APTnotes data |
| yeti-platform/yeti |
1,568 |
|
0 |
0 |
about 2 years ago |
0 |
|
21 |
apache-2.0 |
Python |
| Your Everyday Threat Intelligence |
| maliceio/malice |
1,429 |
|
0 |
0 |
about 3 years ago |
29 |
March 18, 2019 |
26 |
apache-2.0 |
Go |
| VirusTotal Wanna Be - Now with 100% more Hipster |
| mattnotmax/cyberchef-recipes |
1,388 |
|
0 |
0 |
over 3 years ago |
0 |
|
1 |
|
|
| A list of cyber-chef recipes and curated links |
| tomchop/malcom |
957 |
|
0 |
0 |
over 8 years ago |
0 |
|
13 |
other |
Python |
| Malcom - Malware Communications Analyzer |
| kai5263499/osx-security-awesome |
687 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
apache-2.0 |
|
| A collection of OSX and iOS security resources |
| diogo-fernan/ir-rescue |
309 |
|
0 |
0 |
about 5 years ago |
0 |
|
9 |
other |
Batchfile |
| A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response. |
| netevert/pockint |
251 |
|
0 |
0 |
over 2 years ago |
0 |
|
15 |
mit |
Python |
| A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️ |
| joeavanzato/Trawler |
224 |
|
0 |
0 |
over 2 years ago |
0 |
|
6 |
mit |
PowerShell |
| PowerShell script to help Incident Responders discover potential adversary persistence mechanisms. |
| michelcrypt4d4mus/yaralyzer |
144 |
|
1 |
1 |
2 months ago |
59 |
February 01, 2026 |
0 |
gpl-3.0 |
Python |
| Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors. |