OTRF / BHEU22-ADFSLinks
Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations
☆12Updated 3 years ago
Alternatives and similar repositories for BHEU22-ADFS
Users that are interested in BHEU22-ADFS are comparing it to the libraries listed below
Sorting:
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Symantec EDR Internals☆29Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- ☆23Updated last year
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- ☆23Updated 2 years ago
- Progress of learning kernel development☆14Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Help deobfuscate VBScript☆18Updated 3 years ago
- Collection of generic YARA rules☆16Updated 5 months ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- A collection of my presentation materials.☆17Updated last year
- ☆33Updated 3 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- My Malware Analysis Reports☆25Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- ProcDot Malware Sandbox☆26Updated 6 months ago
- Identifies metadata of .NET binary files.☆21Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- ☆15Updated 2 years ago
- ☆18Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago