DidierStevens / FalsePositivesLinks
Tools that trigger False Positive AV alerts
☆50Updated 8 months ago
Alternatives and similar repositories for FalsePositives
Users that are interested in FalsePositives are comparing it to the libraries listed below
Sorting:
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- ☆48Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆60Updated 10 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated 10 months ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- C# User Simulation☆32Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆15Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated last month
- pypykatz plugin for volatility3 framework☆42Updated 3 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 weeks ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- ☆27Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- ☆43Updated 3 years ago
- Machine learning enabled dropper☆27Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago