DiabloHorn / yara4pentesters
rules to identify files containing juicy information like usernames, passwords etc
☆127Updated 7 years ago
Alternatives and similar repositories for yara4pentesters:
Users that are interested in yara4pentesters are comparing it to the libraries listed below
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- ☆76Updated 6 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆47Updated 3 years ago
- Simulating Adversary Operations☆93Updated 6 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- PowerShell No Agent Hunting☆110Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated 2 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- ☆53Updated 4 years ago
- ☆97Updated 6 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 8 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆42Updated 6 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 7 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 2 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago