OSTEsayed / OSTE-MalStatWareLinks
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
☆30Updated last year
Alternatives and similar repositories for OSTE-MalStatWare
Users that are interested in OSTE-MalStatWare are comparing it to the libraries listed below
Sorting:
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year
- ☆76Updated last year
- MS Graph Commands and Tools for Blue Teamers☆52Updated this week
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 11 months ago
- ☆31Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- ☆59Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- A user enumeration tool for Slack.☆35Updated last year
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆43Updated this week
- ☆35Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- ☆37Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Updated 10 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆44Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated 2 years ago
- ☆27Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆67Updated 3 weeks ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- Slides and videos from talks given at cons☆25Updated 7 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆46Updated 7 months ago