ashemery / Anti-Forensics
A Repository to Track Anti-Forensic Techniques
☆95Updated last year
Related projects: ⓘ
- ☆34Updated 5 months ago
- ☆74Updated 3 months ago
- ☆19Updated 9 months ago
- ☆98Updated 7 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated 8 months ago
- ☆82Updated 2 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆64Updated 2 weeks ago
- ☆50Updated 5 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆38Updated 11 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆38Updated 4 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- ☆49Updated 10 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Repository of Yara Rules☆83Updated last week
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated 4 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- Analyse MSI files for vulnerabilities☆80Updated 2 weeks ago
- A C# based tool for analysing malicious OneNote documents☆108Updated last year
- Yara Rules for Modern Malware☆68Updated 6 months ago
- ☆51Updated this week
- ☆24Updated last year
- Source code and examples for PassiveAggression☆54Updated 3 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 2 months ago
- ☆96Updated this week
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆110Updated 3 months ago