EyupErgin / HuntRthysLinks
Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.
☆17Updated last year
Alternatives and similar repositories for HuntRthys
Users that are interested in HuntRthys are comparing it to the libraries listed below
Sorting:
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 3 weeks ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆269Updated last week
- Reports of cyber threat intelligence☆13Updated 2 years ago
- Chista | Open Threat Intelligence Framework☆58Updated last year
- ☆79Updated 3 years ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆369Updated last week
- stmctf22☆35Updated 2 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- An OSINT tool that helps detect members of a company with leaked credentials☆615Updated 5 months ago
- Just some lists of Malware Configs☆171Updated 6 months ago
- A RedTeam Toolkit☆402Updated 3 months ago
- ☆12Updated 2 years ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆217Updated last month
- I share the solutions and scripts of the questions I like in the CTF I enter.☆17Updated last year
- ☆435Updated 5 months ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 3 years ago
- A collection of phishing samples for researchers and detection developers.☆332Updated 6 months ago
- Yet another Ransomware gang tracker☆460Updated this week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆268Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆309Updated 11 months ago
- ☆369Updated this week
- Live Feed of C2 servers, tools, and botnets☆669Updated this week
- Komsu, from a given list of URLs, generates and visualizes trees. It's aim is to fasten the analysis process.☆9Updated 2 weeks ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆305Updated last month
- Just an AV slayer. Nothing special ;)☆216Updated 2 years ago
- Includes voluntary work on all abuses related to earthquakes.☆23Updated 2 years ago
- Red Team Guides☆138Updated last year
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆449Updated last year
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMal…☆269Updated last year
- A suite for hunting suspicious targets, expose domains and phishing discovery☆364Updated last month