mandiant / Vulnerability-Disclosures
☆198Updated 6 months ago
Alternatives and similar repositories for Vulnerability-Disclosures:
Users that are interested in Vulnerability-Disclosures are comparing it to the libraries listed below
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆116Updated 2 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 5 months ago
- Beta versions of my software☆251Updated this week
- Run several volatility plugins at the same time☆114Updated 2 years ago
- ☆130Updated last year
- Emulate and Dissect MSF and *other* attacks☆140Updated last year
- Detect and respond to Cobalt Strike beacons using ETW.☆490Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆323Updated last year
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆120Updated 4 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- ☆414Updated 2 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆129Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆176Updated 3 months ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆127Updated 10 months ago
- Code and yara rules to detect and analyze Cobalt Strike☆265Updated 3 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆182Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆142Updated last year
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆175Updated this week
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- Malduck is your ducky companion in malware analysis journeys☆329Updated 10 months ago