jack8daniels2 / threat-INTel
Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).
☆14Updated 7 years ago
Alternatives and similar repositories for threat-INTel:
Users that are interested in threat-INTel are comparing it to the libraries listed below
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- Searching .evtx logs for remote connections☆24Updated last year
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆20Updated 5 months ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- ☆22Updated last year
- ☆15Updated last year
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- AMSI Bypass for powershell☆30Updated 2 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 2 years ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆17Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 2 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 2 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago