DidierStevens / DidierStevensSuiteLinks
Please no pull requests for this repository. Thanks!
☆2,248Updated last week
Alternatives and similar repositories for DidierStevensSuite
Users that are interested in DidierStevensSuite are comparing it to the libraries listed below
Sorting:
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,095Updated 3 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,943Updated 2 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,562Updated last week
- YARA signature and IOC database for my scanners and tools☆2,659Updated this week
- Volatility 3.0 development☆3,209Updated 2 weeks ago
- yarGen is a generator for YARA rules☆1,657Updated 2 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,610Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,663Updated 2 weeks ago
- A collaborative, multi-platform, red teaming framework☆3,777Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,911Updated last year
- Repository of yara rules☆4,426Updated last year
- Mimikatz implementation in pure Python☆3,059Updated 3 weeks ago
- A curated list of awesome YARA rules, tools, and people.☆3,842Updated 3 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,296Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,790Updated 2 weeks ago
- Interesting APT Report Collection And Some Special IOCs☆2,583Updated 2 weeks ago
- Loki - Simple IOC and YARA Scanner☆3,565Updated 7 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,390Updated last month
- Malware Configuration And Payload Extraction☆2,495Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,607Updated 6 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,642Updated 2 weeks ago
- A list of cyber-chef recipes and curated links☆2,105Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,265Updated 5 months ago
- An advanced memory forensics framework☆7,729Updated last month
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,150Updated 5 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,475Updated last week
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,954Updated this week
- Windows Events Attack Samples☆2,375Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,652Updated 2 weeks ago
- Automated Adversary Emulation Platform☆6,221Updated last month