jeremybeaume / toolsView external linksLinks
Somes tools and scripts
☆153Nov 2, 2021Updated 4 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- ☆15Jan 26, 2023Updated 3 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 9 months ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Mar 10, 2023Updated 2 years ago
- 大家快來抄作業 | 陽明交大高等 UNIX 程式設計☆22May 19, 2022Updated 3 years ago
- ☆18Mar 26, 2024Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- dontpopme bitches☆24Jun 16, 2022Updated 3 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20May 17, 2023Updated 2 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Updated this week
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆20Jan 28, 2022Updated 4 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Mar 15, 2024Updated last year
- ☆80Apr 18, 2023Updated 2 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- Collection of Ghidra convenience VR scripts☆12Dec 14, 2024Updated last year
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- API Hammering with C++20☆50Jul 21, 2022Updated 3 years ago
- Threat Analytics Search Chrome Extension☆12Feb 7, 2026Updated last week
- A tool that can be used to close network connections automatically with a given parameters☆14Apr 19, 2023Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆30May 21, 2019Updated 6 years ago
- Windows x86 PE Packer In C++☆51Nov 18, 2019Updated 6 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆38Dec 7, 2025Updated 2 months ago
- ☆12Feb 20, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated 11 months ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago