2igosha / sunburst_dgaView external linksLinks
☆22Dec 22, 2020Updated 5 years ago
Alternatives and similar repositories for sunburst_dga
Users that are interested in sunburst_dga are comparing it to the libraries listed below
Sorting:
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 7 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Dec 23, 2020Updated 5 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- ☆12Feb 24, 2023Updated 2 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 4 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ASN Lookup Generator for Splunk☆10Jan 24, 2024Updated 2 years ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆82Jan 28, 2026Updated 2 weeks ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Tools for macOS Forensic Bootable media☆15May 20, 2020Updated 5 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Jan 5, 2026Updated last month