bcaseiro / malwaresimulatorLinks
Malware Simulator - Pretend a malware infection by creating a text file into several locations on the local system and also in the network.
☆26Updated 7 years ago
Alternatives and similar repositories for malwaresimulator
Users that are interested in malwaresimulator are comparing it to the libraries listed below
Sorting:
- ☆49Updated 4 years ago
- automate your MISP installs☆68Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- ☆73Updated 7 years ago
- ☆55Updated 3 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Sysmon Splunk App☆47Updated 6 years ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 2 months ago
- Tools for the Computer Incident Response Team☆143Updated 8 years ago
- ☆30Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- A collection of infosec related scripts and information.☆53Updated 8 months ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- ☆36Updated 8 years ago
- Miscelaneous Dockers☆47Updated 3 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- ☆19Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- CrowdStrike Threat Intelligence☆36Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago