intezer / ost-map
☆20Updated 4 years ago
Alternatives and similar repositories for ost-map:
Users that are interested in ost-map are comparing it to the libraries listed below
- ☆22Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Forked and updated with some additional features over the original☆16Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- ☆28Updated 3 months ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago