jaredcatkinson / MalwareMorphology
☆74Updated 3 months ago
Related projects: ⓘ
- Yara Rules for Modern Malware☆68Updated 6 months ago
- Default Detections for EDR☆94Updated 6 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆64Updated 2 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆80Updated last year
- ☆51Updated this week
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- Abuse Azure API permissions for red teaming☆55Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- ☆34Updated 5 months ago
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- ☆79Updated last year
- ☆34Updated 6 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated 4 months ago
- ☆45Updated this week
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- ☆21Updated this week
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- C2 Automation using Linode☆78Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆92Updated 10 months ago
- Decrypt GlobalProtect configuration and cookie files.☆74Updated last week
- A collection of tools, scripts and personal research☆104Updated 2 months ago
- ☆82Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆58Updated 5 months ago
- ☆45Updated 5 months ago
- ☆41Updated 2 years ago
- Active C&C Detector☆148Updated 11 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆91Updated 3 weeks ago