NextronSystems / thor-manual
THOR APT Scanner User Manual
☆18Updated this week
Alternatives and similar repositories for thor-manual
Users that are interested in thor-manual are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- ☆28Updated 4 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆15Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- Windows Security Logging☆43Updated 2 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- Yara Based Detection Engine for web browsers