Skip to content
View RandomRhythm's full-sized avatar

Block or report RandomRhythm

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

This repository is dedicated to documenting different library files (DLLs) susceptible to exploitation through search order hijacking, including side-loading and phantom DLLs

2 Updated Sep 28, 2024

GUI code for VTTL

Visual Basic 6.0 2 Updated Sep 1, 2024

VB Common Controls Replacement Library

Visual Basic 6.0 104 46 Updated Nov 6, 2024

IP addresses analyzed by ThreatIntelligenceAggregator.org

1 Updated Aug 26, 2024

Rename television season episodes and extras organized by disc (folders)

Python 2 Updated Aug 18, 2024
Python 3 Updated Jun 2, 2023

The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad w…

Shell 1,297 159 Updated Nov 7, 2024

Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains use…

Shell 1,132 258 Updated Nov 8, 2024

Sort YARA Rules by File Type

Python 1 Updated Jun 7, 2022

This script will take the CSV output and create a CSV with endpoints grouped by CVE and one with NVD descriptions

Python 1 Updated Jul 7, 2022

SentinelOne Blacklist Export

Python 1 Updated Sep 8, 2022

Takes a list of domains and output one unique domain structure for each unique second (or third) level domain

VBScript 4 1 Updated May 13, 2023

Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.

VBScript 29 3 Updated Sep 2, 2024

A collection of PowerShell scripts I have created during my career - some from IT - most related to Computer Incident Response

PowerShell 3 Updated Aug 24, 2022

A comprehensive PowerShell script to extract as much forensic information as possible from a mounted disk image. It also works with volatile data collected Volexity Volcano data.

PowerShell 3 Updated Nov 20, 2022

Vectra Detect API example in Python

Python 2 Updated Jun 7, 2022

Query for SQL varbinary columns and write the results out to files using SqlDataReader, FileStream and BinaryWriter

C# 3 Updated May 8, 2019

Library and command line tool for interacting with Carbon Black environments.

Python 6 1 Updated Sep 12, 2024

Wrapper to fetch cve information from NVD

Python 1 2 Updated Dec 23, 2021

MSRC API for python

Python 6 3 Updated Jun 17, 2024

Process a CSV of tor alerts against the www.dan.me.uk/tornodes list to confirm if the IP and port are listed.

Python 1 Updated Mar 10, 2022

Converts dns names to Microsoft DNS debug format. Example: google.com becomes (6)google(3)com(0)

Python 1 Updated Oct 21, 2021

Zeek-Formatted Threat Intelligence Feeds

Zeek 343 47 Updated Nov 8, 2024

OWASP CRS (Official Repository)

Python 2,275 380 Updated Nov 8, 2024

Example API code in Python to work with MixMode PacketSled

Python 1 Updated Aug 29, 2021

YARA rules sorted by file type from the Yara-Rules/rules repository

YARA 4 Updated Jun 17, 2022

Get your stuff out of CB Response/EDR.

Python 1 Updated May 19, 2021

Python 3 script downloads national vulnerability database, converts into .csv format, and appends years into one large file. Works on *nux or Windows.

Python 2 Updated Jul 29, 2022

Tracks the frequency of words that follow other words.

C# 9 5 Updated Oct 19, 2021

List of PowerShell commands and commandlets that should be in your Powershel watchlist

38 6 Updated Jul 22, 2021
Next