NextronSystems / thor-manual
THOR APT Scanner User Manual
☆18Updated last week
Alternatives and similar repositories for thor-manual:
Users that are interested in thor-manual are comparing it to the libraries listed below
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- ☆15Updated 3 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- ☆28Updated 3 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆14Updated 3 months ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆11Updated 2 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- General Content☆26Updated 9 months ago
- ☆17Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- THOR Thunderstorm Collectors☆24Updated 3 weeks ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- ☆41Updated last year