☆23Aug 10, 2020Updated 5 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- ☆26Jun 2, 2022Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆23May 15, 2021Updated 4 years ago
- ☆15Aug 7, 2021Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- ☆29Jan 9, 2025Updated last year
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated last month
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Resources for HFS+ Forensics☆37Nov 15, 2015Updated 10 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Parser for the ISO 9660 disk image format☆31Feb 24, 2020Updated 6 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆34Feb 23, 2025Updated last year
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- This repo is dedicated to a powerpoint exploit☆34Dec 11, 2020Updated 5 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- ☆48Jan 6, 2023Updated 3 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- ☆12Feb 16, 2023Updated 3 years ago