alphaSeclab / malware-ioc-hashLinks
Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.
☆19Updated 5 years ago
Alternatives and similar repositories for malware-ioc-hash
Users that are interested in malware-ioc-hash are comparing it to the libraries listed below
Sorting:
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- Work in Progress repo☆15Updated 6 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Updated 3 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆56Updated last year
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- QuasarRAT analysis tools and research report☆28Updated 2 years ago
- Tweettioc Splunk App☆20Updated 5 years ago
- ☆20Updated 5 years ago
- ☆12Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- ☆23Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- This directory contains random scripts from threat hunting or malware research☆11Updated 7 years ago
- ProcDot Malware Sandbox☆26Updated 6 months ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 5 years ago
- ☆23Updated 5 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Everything related to Cobalt Strike☆15Updated 6 years ago
- ☆11Updated 7 years ago
- A Simple PE File Heuristics Scanners☆53Updated 6 years ago
- Telsy CTI Research Team☆57Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- OSSEM Modular☆27Updated 5 years ago
- ☆42Updated 3 years ago
- HoneyDB Python Module☆14Updated 2 years ago