A repository for tracking events related to the MOVEit Transfer Cl0p Campaign
☆71Jul 19, 2023Updated 2 years ago
Alternatives and similar repositories for MOVEit-Transfer
Users that are interested in MOVEit-Transfer are comparing it to the libraries listed below
Sorting:
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 5 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- ☆11May 13, 2024Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆485Feb 20, 2026Updated 2 weeks ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Updated this week
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- Signatures and IoCs from public Volexity blog posts.☆365Dec 4, 2025Updated 3 months ago
- A collection of methods to learn who the owner of an IP address is.☆224Sep 29, 2025Updated 5 months ago
- Canary Detection☆190Oct 20, 2025Updated 4 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆706Apr 21, 2025Updated 10 months ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆59Jun 24, 2025Updated 8 months ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 3 months ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Sep 1, 2025Updated 6 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 8 months ago
- Security Scripts and Sources for daily usage.☆69Jan 25, 2026Updated last month
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- AstroCrypt is a powerful and versatile tool designed to assist you in both cracking hashed passwords and identifying the hash type used t…☆17Oct 26, 2023Updated 2 years ago