OSTEsayed / OSTE-MalStatWareLinks
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
☆31Updated last year
Alternatives and similar repositories for OSTE-MalStatWare
Users that are interested in OSTE-MalStatWare are comparing it to the libraries listed below
Sorting:
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated last week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- ☆52Updated 3 weeks ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- ☆31Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- A user enumeration tool for Slack.☆34Updated last year
- ☆76Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆62Updated 3 weeks ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 9 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆50Updated 9 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆37Updated 2 years ago
- ☆37Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 11 months ago
- ☆35Updated 2 years ago
- Detonate malware on VMs and get logs & detection status☆73Updated this week
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 3 weeks ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- A not-curated list of cloud hacking labs☆26Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago