Insane-Forensics / drovorub-huntLinks
A tool to assist with network-based hunting for GRU's Drovorub malware c2
☆25Updated 4 years ago
Alternatives and similar repositories for drovorub-hunt
Users that are interested in drovorub-hunt are comparing it to the libraries listed below
Sorting:
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated 5 months ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A cover story generator for people who Need Quick Covers On Operations☆13Updated 5 years ago
- ☆45Updated 2 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- ☆22Updated 4 years ago
- IcedID Decryption Tool☆28Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Updated 4 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- ☆23Updated 4 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- ☆15Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- ☆23Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆25Updated 7 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago