IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&CK matrix related
☆383Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for IATelligence
Users that are interested in IATelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,077Dec 11, 2024Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 9 months ago
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆254Oct 29, 2025Updated 4 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Threat Hunting tool about Sysmon and graphs☆337May 28, 2023Updated 2 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆454Feb 18, 2026Updated last month
- Microsoft Threat Intelligence Security Tools☆1,954Mar 6, 2026Updated 2 weeks ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated 2 weeks ago
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- ☆614Jun 1, 2023Updated 2 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆648Nov 7, 2025Updated 4 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,080Feb 1, 2024Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,405Nov 7, 2024Updated last year
- Aims to identify sleeping beacons☆663Jan 25, 2026Updated 2 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆272Jan 18, 2023Updated 3 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆196Mar 15, 2026Updated last week
- ☆413Nov 18, 2022Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,472Aug 18, 2023Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆396Sep 26, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- ☆553Dec 4, 2023Updated 2 years ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆109Jan 3, 2023Updated 3 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆263Sep 26, 2025Updated 5 months ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆500Jan 10, 2023Updated 3 years ago