StrikeReady-Inc / samplesLinks
shared samples from #dailyphish and/or #apt tweets
☆41Updated last week
Alternatives and similar repositories for samples
Users that are interested in samples are comparing it to the libraries listed below
Sorting:
- ☆38Updated 5 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆128Updated 2 years ago
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆89Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆174Updated 2 months ago
- ☆52Updated 10 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- ☆121Updated 11 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆217Updated 2 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated 2 years ago
- Windows Persistence IT-Security☆103Updated 5 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆107Updated 6 months ago
- PoC for CVE-2025-22457☆67Updated 4 months ago
- Malware Analysis tools☆26Updated 11 months ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Updated 2 years ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆244Updated last year
- Configuration Extractors for Malware☆111Updated 4 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- Extract C2 Traffic☆250Updated 9 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆119Updated this week
- Detect WFP filters blocking EDR communications☆93Updated last year
- ☆37Updated 8 months ago
- ☆79Updated last year
- Retrieve inner payloads from Donut samples☆105Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆95Updated 2 years ago
- ☆67Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated 10 months ago
- ☆87Updated 2 years ago
- ☆27Updated 8 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 8 months ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year