OSTEsayed / OSTE-MalStatWareLinks
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
☆29Updated last year
Alternatives and similar repositories for OSTE-MalStatWare
Users that are interested in OSTE-MalStatWare are comparing it to the libraries listed below
Sorting:
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- ☆32Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆43Updated 2 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆35Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 4 months ago
- ☆37Updated last year
- A user enumeration tool for Slack.☆28Updated 11 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 10 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆20Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ☆77Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 10 months ago
- ☆23Updated 3 months ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Updated 4 months ago
- ☆54Updated 5 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆36Updated 4 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆13Updated 5 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 2 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆48Updated 2 months ago
- ☆10Updated 5 months ago
- ECC Public Key Cryptography☆37Updated last year