alexandreborges / malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
☆2,918Updated 2 months ago
Related projects: ⓘ
- A curated list of awesome YARA rules, tools, and people.☆3,472Updated 3 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆4,087Updated this week
- Interesting APT Report Collection And Some Special IOC☆2,369Updated this week
- Red Teaming Tactics and Techniques☆3,979Updated 3 weeks ago
- Malware samples, analysis exercises and other interesting resources.☆1,456Updated 8 months ago
- YARA signature and IOC database for my scanners and tools☆2,442Updated 3 weeks ago
- Loki - Simple IOC and YARA Scanner☆3,343Updated 6 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,383Updated 5 months ago
- Automated Adversary Emulation Platform☆5,506Updated 2 weeks ago
- Wiki to collect Red Team infrastructure hardening resources☆4,098Updated 5 months ago
- A list of cyber-chef recipes and curated links☆2,000Updated 3 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆6,921Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,441Updated last year
- Digging Deeper....☆2,874Updated this week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,184Updated last week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,370Updated this week
- A collaborative, multi-platform, red teaming framework☆3,145Updated this week
- APT & CyberCriminal Campaign Collection☆3,643Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,024Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,280Updated 7 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆3,595Updated 2 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,600Updated 2 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,352Updated last week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆3,975Updated 7 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,715Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,503Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆9,559Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,447Updated this week
- Malware Configuration And Payload Extraction☆1,889Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,699Updated 2 months ago