Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
☆60Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for Abused-Legitimate-Services
Users that are interested in Abused-Legitimate-Services are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Mar 20, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- ☆28Jul 5, 2025Updated 9 months ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last month
- ☆36Jan 11, 2023Updated 3 years ago
- ☆96Apr 8, 2026Updated last week
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Aug 15, 2025Updated 8 months ago
- ☆40Jun 11, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- ☆17Nov 28, 2021Updated 4 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆118Jan 26, 2022Updated 4 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- ☆16Mar 22, 2023Updated 3 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 5 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆118Apr 4, 2023Updated 3 years ago
- Mount VSCs with ease!☆18Jan 22, 2025Updated last year
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- ☆18Mar 26, 2024Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆58Jan 8, 2024Updated 2 years ago
- 分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴☆23Aug 27, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆161Oct 30, 2025Updated 5 months ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆346Sep 1, 2021Updated 4 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 7 months ago