JSCU-NL / COATHANGER
IOCs and detection script for COATHANGER malware
☆50Updated 7 months ago
Related projects: ⓘ
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated 8 months ago
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- create a "simulated internet" cyber range environment☆11Updated 2 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Citrix Scanner for CVE-2023-3519☆47Updated last year
- ASR Configurator, Essentials and Atomic Testing☆32Updated 3 weeks ago
- VLAN ID Parser☆5Updated 4 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆37Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆38Updated 2 months ago
- ☆78Updated last year
- Detection rule validation☆41Updated 10 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆12Updated 2 months ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 2 years ago
- ☆48Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆31Updated last month
- ☆31Updated 5 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- Automated Active Directory lab running on Proxmox☆64Updated last month
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆132Updated last week
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆27Updated last month
- A Repository to Track Anti-Forensic Techniques☆95Updated last year
- Slides of my public talks☆46Updated 9 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- DEFCON 31☆57Updated 2 months ago
- ☆29Updated last year
- ESXi Cyber Security Incident Response Script☆19Updated 2 weeks ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year