curated-intel / MOVEit-TransferView external linksLinks
A repository for tracking events related to the MOVEit Transfer Cl0p Campaign
☆71Jul 19, 2023Updated 2 years ago
Alternatives and similar repositories for MOVEit-Transfer
Users that are interested in MOVEit-Transfer are comparing it to the libraries listed below
Sorting:
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 4 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated 10 months ago
- ☆11Feb 22, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- ☆11May 13, 2024Updated last year
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆483Jan 21, 2026Updated 3 weeks ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Jan 30, 2026Updated 2 weeks ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 weeks ago
- A collection of methods to learn who the owner of an IP address is.☆224Sep 29, 2025Updated 4 months ago
- Canary Detection☆188Oct 20, 2025Updated 3 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆703Apr 21, 2025Updated 9 months ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- ☆13Feb 5, 2022Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 9 months ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆59Jun 24, 2025Updated 7 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Mar 24, 2024Updated last year
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 2 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Sep 1, 2025Updated 5 months ago
- Ransomware Decryptors☆36Apr 28, 2022Updated 3 years ago
- Security Scripts and Sources for daily usage.☆73Jan 25, 2026Updated 3 weeks ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 2 years ago