curated-intel / Initial-Access-Broker-Landscape
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
☆113Updated 3 years ago
Alternatives and similar repositories for Initial-Access-Broker-Landscape:
Users that are interested in Initial-Access-Broker-Landscape are comparing it to the libraries listed below
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- ☆41Updated 11 months ago
- Simple PowerShell script to enable process scanning with Yara.☆92Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Active C2 IoCs☆97Updated 2 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Open IOC sharing platform☆56Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆172Updated 6 months ago
- Just my findings of malwares☆44Updated 2 years ago
- ☆26Updated 3 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- URL fingerprinting made easy☆85Updated 11 months ago
- ☆33Updated last year
- ☆65Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 3 weeks ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Yara Rules for Modern Malware☆73Updated last year
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Notes and IoCs of fresh malware☆57Updated 8 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ShellSweeping the evil.☆52Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year