AhmetPayaslioglu / YaraRules
☆21Updated last year
Alternatives and similar repositories for YaraRules:
Users that are interested in YaraRules are comparing it to the libraries listed below
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- ☆18Updated 10 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆52Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- My Malware Analysis Reports☆19Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- ☆37Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- ☆45Updated last year
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- SharpLDAP is a tool written in C# that aims to do enumeration via LDAP queriesUpdated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- All my POC related to malware development☆11Updated 9 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆57Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated last week
- ☆25Updated 2 months ago
- Golang bindings for PE-sieve☆42Updated last year
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated last year
- ☆38Updated 2 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Updated 2 years ago
- ☆18Updated 4 months ago
- ☆46Updated 2 years ago
- ☆25Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- A LAPS dumper written using the impacket library.☆31Updated last year