OSTEsayed / OSTE-MalStatWareLinks
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
☆30Updated last year
Alternatives and similar repositories for OSTE-MalStatWare
Users that are interested in OSTE-MalStatWare are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆51Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- ☆79Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- ☆31Updated 2 years ago
- Slides and videos from talks given at cons☆25Updated 5 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 8 months ago
- ☆35Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- ☆27Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 8 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 11 months ago
- A user enumeration tool for Slack.☆32Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆54Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last week
- ☆37Updated last year
- Detonate malware on VMs and get logs & detection status☆60Updated last week
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 6 months ago
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year