CYB3RMX / Qu1cksc0pe
All-in-One malware analysis tool.
☆1,584Updated 3 weeks ago
Alternatives and similar repositories for Qu1cksc0pe
Users that are interested in Qu1cksc0pe are comparing it to the libraries listed below
Sorting:
- Tools and Techniques for Blue Team / Incident Response☆3,106Updated last month
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,016Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,792Updated last month
- A list of free and open forensics analysis tools and other resources☆1,295Updated 3 weeks ago
- A resource containing all the tools each ransomware gangs uses☆1,024Updated last week
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆5,090Updated this week
- ThePhish: an automated phishing email analysis tool☆1,223Updated 9 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,188Updated 3 months ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆872Updated last year
- Awesome Security lists for SOC/CERT/CTI☆960Updated this week
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆575Updated 7 months ago
- Tools & Interesting Things for RedTeam Ops☆2,192Updated 2 years ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆349Updated 9 months ago
- The essential toolkit for reversing, malware analysis, and cracking☆857Updated 2 weeks ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,334Updated 6 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆847Updated 4 years ago
- Tools and Techniques for Red Team / Penetration Testing☆6,686Updated last month
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆671Updated 6 months ago
- Red Team Cheatsheet in constant expansion.☆1,189Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 3 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆558Updated this week
- Malware samples, analysis exercises and other interesting resources.☆1,552Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,653Updated 6 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,079Updated 10 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,079Updated 3 months ago
- A full stack web application that combines many tools and services for security analysts into a single tool.☆616Updated last month
- A centralized and enhanced memory analysis platform☆459Updated 3 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,025Updated 3 years ago
- Yet another Ransomware gang tracker☆426Updated last week
- Awesome EDR Bypass Resources For Ethical Hacking☆1,182Updated 3 months ago