0xToxin / Malware-IOCs
Just my findings of malwares
☆43Updated 2 years ago
Alternatives and similar repositories for Malware-IOCs:
Users that are interested in Malware-IOCs are comparing it to the libraries listed below
- ☆34Updated last year
- ☆65Updated 2 years ago
- ☆32Updated 10 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- Yara Rules for Modern Malware☆73Updated 11 months ago
- ☆32Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- ☆36Updated 10 months ago
- Malware vulnerability intel tool for third-party attackers☆114Updated 3 months ago
- ☆34Updated 11 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 8 months ago
- OSCP Study Guide☆40Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆46Updated this week
- Default Detections for EDR☆97Updated 11 months ago
- IOC Collection 2022☆57Updated last year
- ☆41Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆80Updated 2 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆113Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆63Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year