alphaSeclab / malware-ioc-hashLinks
Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.
☆17Updated 4 years ago
Alternatives and similar repositories for malware-ioc-hash
Users that are interested in malware-ioc-hash are comparing it to the libraries listed below
Sorting:
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- module for certexfil☆15Updated 3 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Work in Progress repo☆14Updated 6 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- ☆17Updated 5 years ago
- ☆16Updated 5 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- ☆13Updated 5 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Updated 10 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago