OSTEsayed / OSTE-MalStatWare
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
☆29Updated 11 months ago
Alternatives and similar repositories for OSTE-MalStatWare:
Users that are interested in OSTE-MalStatWare are comparing it to the libraries listed below
- ☆32Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- A user enumeration tool for Slack.☆27Updated 10 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆28Updated 3 weeks ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆25Updated 9 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆37Updated 3 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 2 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- ☆37Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 9 months ago
- ☆28Updated last year
- ☆23Updated 2 months ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆12Updated 7 months ago
- ☆77Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- ☆34Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆50Updated last month
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆29Updated last month
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 6 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 6 months ago
- create a "simulated internet" cyber range environment☆16Updated 3 weeks ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆13Updated 3 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆45Updated 3 months ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Updated 3 months ago