DidierStevens / DidierStevensSuiteLinks
Please no pull requests for this repository. Thanks!
☆2,228Updated last week
Alternatives and similar repositories for DidierStevensSuite
Users that are interested in DidierStevensSuite are comparing it to the libraries listed below
Sorting:
- yarGen is a generator for YARA rules☆1,647Updated last month
- YARA signature and IOC database for my scanners and tools☆2,634Updated 2 weeks ago
- A curated list of awesome YARA rules, tools, and people.☆3,819Updated 2 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,073Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,925Updated last month
- Repository of yara rules☆4,410Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,278Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,552Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,604Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,339Updated 3 weeks ago
- Loki - Simple IOC and YARA Scanner☆3,552Updated 6 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,911Updated last week
- Volatility 3.0 development☆3,165Updated last week
- ☆2,281Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,897Updated 11 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,618Updated this week
- Windows Events Attack Samples☆2,368Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,572Updated this week
- A collaborative, multi-platform, red teaming framework☆3,707Updated this week
- A repository of sysmon configuration modules☆2,788Updated 9 months ago
- Malware Configuration And Payload Extraction☆2,452Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,835Updated 2 weeks ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,092Updated 10 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,207Updated 4 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,258Updated last year
- Red Teaming Tactics and Techniques☆4,271Updated 9 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,777Updated last week
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,928Updated 3 months ago
- Mimikatz implementation in pure Python☆3,035Updated last week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,156Updated last month