NextronSystems / thor-manual
THOR APT Scanner User Manual
☆18Updated this week
Alternatives and similar repositories for thor-manual:
Users that are interested in thor-manual are comparing it to the libraries listed below
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Parser for Windows PowerShell script block logs☆13Updated 2 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- Hunt for SQLite files used by various applications☆23Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- ☆15Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆28Updated 2 months ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated last month
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆41Updated 11 months ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆26Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- General Content☆26Updated 8 months ago
- Windows Security Logging☆43Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- A quick reference guide for python script development in DFIR☆16Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- ☆14Updated last month
- Penguin OS Forensic (or Flight) Recorder☆40Updated 3 months ago