MalBeacon / what-is-this-stealerView external linksLinks
A repository of credential stealer formats
☆244Jun 10, 2025Updated 8 months ago
Alternatives and similar repositories for what-is-this-stealer
Users that are interested in what-is-this-stealer are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- ☆31Feb 28, 2025Updated 11 months ago
- A resource containing all the tools each ransomware gangs uses☆1,327Dec 24, 2025Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆845Mar 5, 2025Updated 11 months ago
- Mapping of open-source detection rules and atomic tests.☆195Feb 10, 2026Updated last week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,307Nov 12, 2025Updated 3 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated last month
- PowerShell tools to help defenders hunt smarter, hunt harder.☆457Oct 29, 2025Updated 3 months ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆780Updated this week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆600Feb 7, 2026Updated last week
- DFIQ is a collection of investigative questions and the approaches for answering them☆301Jan 17, 2025Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆633Aug 4, 2025Updated 6 months ago
- ☆251Jun 7, 2025Updated 8 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Oct 29, 2024Updated last year
- Repository of Yara Rules☆139Updated this week
- High Octane Triage Analysis☆813Updated this week
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆508Aug 14, 2025Updated 6 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆310Nov 4, 2025Updated 3 months ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 7 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆426Nov 28, 2025Updated 2 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆125Jan 27, 2025Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,036Jan 11, 2026Updated last month
- Awesome Security lists for SOC/CERT/CTI☆1,247Updated this week
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆77Dec 15, 2025Updated 2 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Updated this week
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆574Dec 6, 2025Updated 2 months ago
- ☆552Dec 4, 2023Updated 2 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,238Feb 5, 2026Updated last week
- A python script developed to process Windows memory images based on triage type.☆264Nov 25, 2023Updated 2 years ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,073Nov 25, 2025Updated 2 months ago
- Find potential DLL Sideloads on your windows computer☆219Jan 12, 2025Updated last year
- Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods…☆1,397Feb 9, 2026Updated last week
- AIL framework - Analysis Information Leak framework☆878Feb 4, 2026Updated last week