certgovaz / MAKLinks
Malware-Analysis-Kit
☆14Updated 10 years ago
Alternatives and similar repositories for MAK
Users that are interested in MAK are comparing it to the libraries listed below
Sorting:
- Carbon Black Response IR tool☆55Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 5 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 4 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Updated 2 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Threat Box Assessment Tool☆19Updated 4 years ago
- OSSEM Modular☆27Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated 2 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 6 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 4 years ago
- C# User Simulation☆33Updated 3 years ago
- Yara rules☆22Updated 2 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Updated 8 months ago
- Old home of LimaCharlie, open source EDR☆32Updated 2 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- ☆38Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Updated 4 years ago
- ☆10Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 4 years ago