heyitsmikeyv / base64-keystringsLinks
Find key search strings to locate base64-encoded versions of ASCII strings.
☆26Updated 3 years ago
Alternatives and similar repositories for base64-keystrings
Users that are interested in base64-keystrings are comparing it to the libraries listed below
Sorting:
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 3 years ago
- Simple yara rule manager☆66Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 4 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆129Updated 8 years ago
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- A collection of typical false positive indicators☆56Updated 5 years ago
- Different tools, koen.vanimpe@cudeso.be☆137Updated 6 months ago
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated 2 years ago
- ☆76Updated 7 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- ☆54Updated 5 years ago
- Valhalla API Client☆70Updated 3 weeks ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 6 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Updated 4 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆18Updated 6 years ago
- XOR Key Extractor☆51Updated last year
- ☆69Updated 4 years ago