curated-intel / Initial-Access-Broker-Landscape
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
☆107Updated 2 years ago
Related projects: ⓘ
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆76Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- ☆25Updated 3 years ago
- ☆17Updated this week
- ☆34Updated 9 months ago
- URL fingerprinting made easy☆80Updated 5 months ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆47Updated 9 years ago
- Active C2 IoCs☆96Updated last year
- Open IOC sharing platform☆52Updated 11 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- IOC Collection 2022☆55Updated last year
- ShellSweeping the evil.☆49Updated 3 months ago
- Lazarus analysis tools and research report☆54Updated 8 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆162Updated last year
- Carbon Black Response IR tool☆53Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆74Updated 2 years ago
- ☆59Updated 3 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- ☆40Updated 5 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆144Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆75Updated last week
- Simple PowerShell script to enable process scanning with Yara.☆86Updated last year
- ☆62Updated 3 years ago
- ☆42Updated 2 years ago
- C2 Active Scanner☆45Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 3 months ago