jack8daniels2 / threat-INTel
Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).
☆13Updated 7 years ago
Related projects: ⓘ
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆30Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- Extracting AsyncRAT configuration using CyberChef☆11Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆19Updated last month
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated last year
- Searching .evtx logs for remote connections☆23Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆45Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated last year
- ☆19Updated this week
- PoC-Malware-TTPs☆48Updated last year
- Repository for archiving Cobalt Strike configuration☆28Updated this week
- ☆21Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆21Updated last year
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆33Updated 4 years ago
- Python, C++ and Go☆21Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 4 years ago
- AMSI Bypass for powershell☆29Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- My Malware Analysis Reports☆18Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆18Updated 5 months ago
- Simple C2 over the Trello API☆37Updated last year
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆19Updated 3 years ago
- ☆12Updated 4 years ago
- Reverse shell macro using Word VBA☆13Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆17Updated 2 years ago