jaredcatkinson / MalwareMorphology
☆80Updated 3 months ago
Alternatives and similar repositories for MalwareMorphology:
Users that are interested in MalwareMorphology are comparing it to the libraries listed below
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- Yara Rules for Modern Malware☆73Updated last year
- Default Detections for EDR☆96Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 9 months ago
- ☆37Updated 11 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆37Updated last week
- https://lolad-project.github.io/☆72Updated 2 months ago
- Artifact monitoring that ensures fairplay☆75Updated last month
- ☆38Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 5 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 9 months ago
- The most average C2 ever (MACE)☆96Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 10 months ago
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- A collection of tools, scripts and personal research☆127Updated 8 months ago
- ☆63Updated 3 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆90Updated last year
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆35Updated last month
- Contains compiled binaries of Volatility☆33Updated last month
- ☆32Updated last year
- Utilities for obfuscating shellcode☆54Updated 8 months ago