apasamar / RootedCON_Malaga2021Links
RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)
☆14Updated 3 years ago
Alternatives and similar repositories for RootedCON_Malaga2021
Users that are interested in RootedCON_Malaga2021 are comparing it to the libraries listed below
Sorting:
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 6 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- ☆67Updated 2 years ago
- ☆31Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- ☆26Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- ☆37Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- Learning volatility plugins.☆18Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- ☆33Updated last year