EyupErgin / HuntRthysLinks
Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.
☆18Updated 2 years ago
Alternatives and similar repositories for HuntRthys
Users that are interested in HuntRthys are comparing it to the libraries listed below
Sorting:
- Chista | Open Threat Intelligence Framework☆61Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆13Updated 3 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆308Updated 3 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Red Team Guides☆143Updated last year
- Just some lists of Malware Configs☆173Updated 10 months ago
- ☆13Updated 2 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆64Updated 3 months ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- ☆52Updated 3 months ago
- Just an AV slayer. Nothing special ;)☆215Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 7 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 4 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Windows for Red Teamers☆126Updated 3 years ago
- ☆56Updated 2 years ago
- Reports of cyber threat intelligence☆13Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆218Updated 6 months ago
- ⚠️ Malware Development training ⚠️☆39Updated 9 months ago
- Ransomware groups posts☆43Updated this week
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated 2 years ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 3 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆172Updated 3 months ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆113Updated last year