infosecB / LOOBinsLinks
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes.
☆514Updated last week
Alternatives and similar repositories for LOOBins
Users that are interested in LOOBins are comparing it to the libraries listed below
Sorting:
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆372Updated 3 years ago
- Signatures and IoCs from public Volexity blog posts.☆361Updated 3 weeks ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆119Updated last week
- a tool to help operate in EDRs' blind spots☆771Updated last year
- Jupyter Notebooks for the Blue Team☆146Updated 9 months ago
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆514Updated 3 weeks ago
- LotL RMM☆269Updated last month
- Ransomware simulator written in Golang☆463Updated 3 years ago
- Purple Team Exercise Framework☆757Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆671Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 3 years ago
- A repository of credential stealer formats☆236Updated 6 months ago
- Okta Verify and Okta FastPass Abuse Tool☆338Updated last year
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆408Updated last week
- Blue Team detection lab created with Terraform and Ansible in Azure.☆173Updated last year
- Infrastructure Automation☆359Updated last year
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- Different learning materials☆228Updated 3 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆322Updated 8 months ago
- Rules generated from our investigations.☆203Updated 6 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆343Updated 9 months ago
- An open-source self-hosted purple team management web application.☆295Updated 2 weeks ago
- MAL-CL (Malicious Command-Line)☆323Updated 2 years ago
- BlueHound - pinpoint the security issues that actually matter☆757Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆271Updated 7 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 2 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆478Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated 2 years ago
- Retired TrustedSec Capabilities☆248Updated last year