Presentation materials for talks I've given.
☆20Oct 14, 2019Updated 6 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- ☆20Dec 8, 2018Updated 7 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- ☆14Sep 3, 2017Updated 8 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 5 years ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Apr 22, 2020Updated 5 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆10Nov 15, 2020Updated 5 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 4 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- ☆14Jun 7, 2023Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 10 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Oct 21, 2021Updated 4 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Apr 22, 2022Updated 3 years ago
- ☆28Jul 5, 2025Updated 8 months ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 6 months ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago