Droogy / Malware-Study
A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.
☆13Updated 3 years ago
Related projects: ⓘ
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆28Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 2 years ago
- ☆41Updated 2 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- ☆47Updated 4 years ago
- ☆13Updated 8 months ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆73Updated last month
- Cobalt Strike/C2 Servers☆12Updated 3 years ago
- Continuous kerberoast monitor☆43Updated last year
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- ☆15Updated 3 years ago
- ☆23Updated this week
- ☆10Updated this week
- Zoom Persistence Aggressor and Handler☆53Updated 3 years ago
- ☆30Updated 4 years ago
- ☆36Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆22Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- (kinda) Malicious Outlook Reader☆17Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆45Updated 2 years ago
- Execute Mimikatz with different technique☆50Updated 2 years ago
- Service Enumeration C# .NET Assembly☆59Updated 3 years ago