HuskyHacks / MalAPIReader
Reads and prints information from the website MalAPI.io
☆38Updated 3 years ago
Alternatives and similar repositories for MalAPIReader:
Users that are interested in MalAPIReader are comparing it to the libraries listed below
- Yara Rules for Modern Malware☆77Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- ☆41Updated 2 years ago
- ☆80Updated 5 months ago
- ☆33Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- ☆63Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆28Updated 10 months ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 4 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- ☆38Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- ☆27Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆82Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- ☆32Updated 2 years ago