Ud0g-Py / Killing-The-Bear
Repository and archive for Killing The Bear Gitbook
☆84Updated last year
Alternatives and similar repositories for Killing-The-Bear:
Users that are interested in Killing-The-Bear are comparing it to the libraries listed below
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆115Updated 4 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆63Updated 3 years ago
- ☆64Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated last year
- Just my findings of malwares☆44Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- ☆57Updated last year
- ☆41Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆112Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Creates and sends fake meeting invite☆58Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- ☆24Updated last month
- Notes and IoCs of fresh malware☆57Updated 8 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 8 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- ☆119Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago