magicsword-io / Magic-SigExplorer
☆11Updated 3 months ago
Alternatives and similar repositories for Magic-SigExplorer:
Users that are interested in Magic-SigExplorer are comparing it to the libraries listed below
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- ☆32Updated 2 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- ☆34Updated 2 years ago
- ShellSweeping the evil.☆52Updated 7 months ago
- Can you pay the ransom in your country?☆13Updated last year
- Links to malware-related YARA rules☆14Updated 2 years ago
- Unpacker for donut shellcode☆11Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Linux #rootkit and #malware revealer☆21Updated 5 months ago
- Method of finding interesting domains using keywords + JARMs☆13Updated last year
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆11Updated 2 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Generate YARA rules for OOXML documents.☆37Updated last year
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆25Updated 6 months ago
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- Threat Mitigation Strategies☆25Updated last year
- runs sliver command on all hosts, partially based on example in sliver repo☆12Updated 9 months ago
- THOR Thunderstorm Collectors☆24Updated 4 months ago
- Threat hunting with EQL and Bro. This repo contains modifications to EQL and EQLLib to use BRO logs.☆8Updated 5 years ago
- ☆19Updated 8 months ago
- Specialized tool to dump Position Independent Code.☆21Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Parser for Windows PowerShell script block logs☆13Updated 2 weeks ago
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago