JSCU-NL / COATHANGERLinks
IOCs and detection script for COATHANGER malware
☆55Updated last year
Alternatives and similar repositories for COATHANGER
Users that are interested in COATHANGER are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 3 weeks ago
- Detection rule validation☆41Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- PowerShell Script Analyzer☆69Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 11 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆14Updated last month
- ☆32Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆47Updated 6 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆76Updated 2 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆44Updated 4 months ago
- ASR Configurator, Essentials and Atomic Testing☆71Updated 3 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year
- create a "simulated internet" cyber range environment☆17Updated last month
- Simulation of Akira Ransomware with Invoke-AtomicTest☆16Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆87Updated 6 months ago
- ☆18Updated 3 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated last year
- ☆80Updated 2 years ago
- ☆74Updated 3 weeks ago
- ☆32Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- God Mode Detection Rules☆134Updated 11 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- Slides of my public talks☆56Updated last year