toolsmith 32
View all
AI-Powered Knowledge Graph Generator & APTs
OctoSQL & Vulnerability Data
toolsmith snapshot: Protect AI ModelScan
Sandfly Security
EDA with CISSM
Prowler v3 - AWS & Azure security assessments
Chainsaw
EPSScall - An Exploit Prediction Scoring System App
LotL Classifier tests for shells, exfil, and miners
Zircolite vs Defense Evasion & Nobellium FoggyWeb
toolsmith snapshot: Adversary Simulation with Sim
toolsmith snapshot: Gordon - cyber reputation checks
toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool
To the Brim at the Gates of Mordor
Toolsmith Snapshot: SpectX IP Hitcount Query
SpectX: Log Parser for DFIR
Chain Reactor: Simulate Adversary Behaviors on Linux
DeepBlueCLI: Powershell Threat Hunting
Toolsmith Snapshot: Search with SauronEye
DFIR Redefined Part 3: visNetwork for Network Data
KAPE: Kroll Artifact Parser and Extractor
Commando VM: The Complete Mandiant Offensive VM
toolsmith snapshot: r-cyber with rud.is
Beagle: Graph transforms for DFIR data & logs
Detection Development: The Research Cycle & NIST CSF
Toolsmith Snapshot: Ad Blocking With Pi Hole
gganimate: Animate YouR Security Analysis
ViperMonkey: VBA maldoc deobfuscation
RedHunt Linux - Adversary Emulation & Threat Hunting
Toolsmith Snapshot: Bashark - Linux post-exploitation toolkit
Shodan As A Verb - Find The Fail Before It Finds You
HolisticInfoSec