infosecB / LOOBinsLinks
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes.
☆501Updated 3 months ago
Alternatives and similar repositories for LOOBins
Users that are interested in LOOBins are comparing it to the libraries listed below
Sorting:
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆369Updated 2 years ago
- Ransomware simulator written in Golang☆453Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆766Updated 11 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated last year
- Signatures and IoCs from public Volexity blog posts.☆359Updated last month
- LotL RMM☆256Updated 3 weeks ago
- Jupyter Notebooks for the Blue Team☆148Updated 8 months ago
- Purple Team Exercise Framework☆747Updated last year
- An open-source self-hosted purple team management web application.☆292Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆290Updated last week
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated last year
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆402Updated last week
- Different learning materials☆229Updated 2 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆321Updated 6 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆202Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆615Updated 3 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆488Updated last month
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆168Updated last year
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆206Updated last week
- Incident Response collection and processing scripts with automated reporting scripts☆314Updated last year
- Retired TrustedSec Capabilities☆248Updated 11 months ago
- Rules generated from our investigations.☆202Updated 5 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆192Updated 9 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆338Updated 2 weeks ago
- A repository of credential stealer formats☆233Updated 5 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated 2 years ago