A repository for tracking events related to the MOVEit Transfer Cl0p Campaign
☆71Jul 19, 2023Updated 2 years ago
Alternatives and similar repositories for MOVEit-Transfer
Users that are interested in MOVEit-Transfer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆29Oct 10, 2023Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆100Feb 2, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 7 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- KQL Sentinel and Defender Detection and Hunting Queries.☆16Feb 24, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆23Jan 29, 2024Updated 2 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Map tracking ransomware, by OCD World Watch team☆487Feb 20, 2026Updated 2 months ago
- Security Scripts and Sources for daily usage.☆74Apr 28, 2026Updated last week
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Mar 24, 2024Updated 2 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆25Apr 30, 2026Updated last week
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Signatures and IoCs from public Volexity blog posts.☆367Dec 4, 2025Updated 5 months ago
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated last month
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆179Mar 2, 2026Updated 2 months ago
- A list of RMMs designed to be used in automation to build alerts☆119Nov 9, 2025Updated 5 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆720Apr 25, 2026Updated last week
- A collection of methods to learn who the owner of an IP address is.☆233Sep 29, 2025Updated 7 months ago
- Canary Detection☆195Oct 20, 2025Updated 6 months ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆81Apr 12, 2026Updated 3 weeks ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Generate portable TTP intelligence from a web-based report☆32Oct 24, 2022Updated 3 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 4 years ago
- MISP to Sentinel integration☆80Apr 21, 2026Updated 2 weeks ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 3 weeks ago