aws-samples / drs-malware-scan
Perform file-based malware scan on your on-prem servers with AWS
☆12Updated last year
Alternatives and similar repositories for drs-malware-scan:
Users that are interested in drs-malware-scan are comparing it to the libraries listed below
- Tool for obtaining information about PPL processes☆17Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 9 months ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 9 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- Kibana app for RedELK☆16Updated 2 years ago
- File integrity monitor proof-of-concept in PowerShell sends a message via Telegram when it detects changes to a specified directory. It c…☆11Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 5 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 11 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆23Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- ☆17Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Slides and videos from talks given at cons☆13Updated 9 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- ☆14Updated 2 months ago
- Searching .evtx logs for remote connections☆23Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Create an AMI with CobaltStrike and related tools.☆9Updated last week
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- ☆17Updated last year
- ☆16Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago