fastfire / IoC_Attack_ESXi_Feb_2023
Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for IoC_Attack_ESXi_Feb_2023
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Can you pay the ransom in your country?☆14Updated 11 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 5 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- ☆42Updated 2 years ago
- A user enumeration tool for Slack.☆24Updated 5 months ago
- self-hosted Azure OSINT tool☆23Updated 2 months ago
- Continuous kerberoast monitor☆44Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆14Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- ☆17Updated last year
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆44Updated 6 months ago
- ☆22Updated 3 years ago
- Stupid Simple Detection Testing☆12Updated 8 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- ShellSweeping the evil.☆52Updated 5 months ago
- ☆29Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated 7 months ago
- Indicators of Normality☆12Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 7 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆28Updated 7 months ago