HuskyHacks / MalAPIReader
Reads and prints information from the website MalAPI.io
☆38Updated 3 years ago
Alternatives and similar repositories for MalAPIReader:
Users that are interested in MalAPIReader are comparing it to the libraries listed below
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Yara Rules for Modern Malware☆73Updated 10 months ago
- ☆79Updated 2 months ago
- ☆34Updated 11 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- ☆81Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Default Detections for EDR☆96Updated 11 months ago
- ☆41Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆147Updated last year
- C2 Automation using Linode☆78Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- ☆63Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆64Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Updated last year
- Ansible playbooks for the Seclab project☆12Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- ☆37Updated 3 years ago