ATLAS - Malware Analysis Description
☆21Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for ATLAS
Users that are interested in ATLAS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Carbon Black Response IR tool☆56Dec 10, 2020Updated 5 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Mar 23, 2023Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- FlowBlot is static code analysis benchmark project by Codethreat, including sink-source challenges grouped into various technical analysi…☆18Feb 9, 2024Updated 2 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- ☆23May 19, 2019Updated 6 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Aug 6, 2017Updated 8 years ago
- Metamorphic Code Generator & Loader☆15Dec 7, 2020Updated 5 years ago
- Registry tracker☆17Apr 3, 2013Updated 13 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆307May 6, 2021Updated 4 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- iSMET (A)symmetric Meterpreter Encryption Tool☆26Oct 26, 2020Updated 5 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- An implementation of a device tracking technique based on Algorithm 4 (Double-Hash Port Selection) of RFC 6056.☆16Sep 28, 2022Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆25Sep 2, 2016Updated 9 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago