RanjitPatil / Malicious-Document-Analysis
☆22Updated last year
Alternatives and similar repositories for Malicious-Document-Analysis
Users that are interested in Malicious-Document-Analysis are comparing it to the libraries listed below
Sorting:
- ☆32Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 10 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated 10 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- OSCP Study Guide☆40Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- ☆37Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆20Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 7 months ago
- A collection of red blue team staff☆46Updated last year
- Challenge Python☆19Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 11 months ago
- Fast Path Traversal exploitation tool☆21Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- ☆27Updated 2 years ago
- ☆40Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆31Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- ☆35Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- Python, C++ and Go☆23Updated 2 years ago
- ☆54Updated 5 months ago