StrikeReady-Inc / samplesLinks
shared samples from #dailyphish and/or #apt tweets
☆41Updated 2 months ago
Alternatives and similar repositories for samples
Users that are interested in samples are comparing it to the libraries listed below
Sorting:
- ☆46Updated last week
- A collection of tools and detections for the Sliver C2 Frameworj☆132Updated 2 years ago
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆88Updated 2 years ago
- Malware Analysis tools☆26Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆30Updated 2 months ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆180Updated 4 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆222Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- ☆58Updated last year
- ☆122Updated last year
- Configuration Extractors for Malware☆119Updated 6 months ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Updated 3 years ago
- Windows Persistence IT-Security☆106Updated 8 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆110Updated 9 months ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Updated 2 years ago
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆66Updated 2 weeks ago
- A command and control (C2) server☆57Updated last year
- Retrieve inner payloads from Donut samples☆111Updated last year
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆70Updated 6 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆132Updated this week
- ☆18Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆250Updated last year
- ☆80Updated last year
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Updated 3 years ago
- ☆67Updated 2 years ago
- ☆37Updated 11 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆50Updated 2 years ago
- ☆88Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago