Cybernite-Technologies / trickbot-leak
☆52Updated this week
Related projects: ⓘ
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 5 months ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆30Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- Reads and prints information from the website MalAPI.io☆38Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- ☆34Updated 6 months ago
- ☆37Updated 2 years ago
- ☆17Updated this week
- Carbon Black Response IR tool☆53Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆34Updated 2 years ago
- IOC Collection 2022☆55Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆86Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Malware vulnerability intel tool for third-party attackers.☆107Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 3 months ago
- C2 Active Scanner☆45Updated 3 months ago
- ☆62Updated 3 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- ☆25Updated 3 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆47Updated 9 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆51Updated 2 years ago
- Detection rule validation☆41Updated 10 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆36Updated 5 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆30Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆14Updated 2 years ago