OSTEsayed / OSTE-MalStatWareLinks
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
☆30Updated last year
Alternatives and similar repositories for OSTE-MalStatWare
Users that are interested in OSTE-MalStatWare are comparing it to the libraries listed below
Sorting:
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆31Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 9 months ago
- ☆78Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated 2 weeks ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆40Updated last year
- A user enumeration tool for Slack.☆31Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 7 months ago
- Slides and videos from talks given at cons☆25Updated 4 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆39Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 7 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- ☆37Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- ☆35Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- ☆27Updated 2 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆46Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 10 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago