EmergingThreats / pdf_object_hashingLinks
☆82Updated 4 months ago
Alternatives and similar repositories for pdf_object_hashing
Users that are interested in pdf_object_hashing are comparing it to the libraries listed below
Sorting:
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Updated 11 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated 2 months ago
- ☆50Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- MS Graph Commands and Tools for Blue Teamers☆52Updated last week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Updated 6 months ago
- Baseline a Windows System against LOLBAS☆70Updated last week
- information about ransomware groups (Ransomware Analysis Notes)☆41Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆127Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- ☆56Updated last year
- Purple-team telemetry & simulation toolkit.☆107Updated last month
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆153Updated last month
- PowerShell Script Analyzer☆70Updated 2 years ago
- ☆37Updated last year
- Tor onion address lookup☆59Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- ☆76Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 11 months ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆92Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- A YARA & Malware Analysis Toolkit written in Rust.☆92Updated this week
- Protection against HTML smuggling attacks.☆101Updated 7 months ago
- Linux #rootkit and #malware revealer☆31Updated last year
- create a "simulated internet" cyber range environment☆19Updated 2 weeks ago
- IOCs and notes related to malware☆27Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year