Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
☆60Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for Abused-Legitimate-Services
Users that are interested in Abused-Legitimate-Services are comparing it to the libraries listed below
Sorting:
- ☆33Feb 26, 2022Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- ☆36Jan 11, 2023Updated 3 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Convert an IP into Alternative / Obfuscated versions of itself☆14Aug 13, 2022Updated 3 years ago
- ☆17Nov 28, 2021Updated 4 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Just Another broken Registry Parser (JARP)