mandiant / Vulnerability-Disclosures
☆192Updated last month
Related projects ⓘ
Alternatives and complementary repositories for Vulnerability-Disclosures
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆240Updated last year
- Emulate and Dissect MSF and *other* attacks☆139Updated 8 months ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆167Updated 3 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆481Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆311Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆174Updated 2 years ago
- ☆130Updated 9 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆194Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- A repository of previous info-sec presentations I've presented.☆156Updated 3 weeks ago
- A collection of tools to interact with Microsoft Security Response Center API☆95Updated 10 months ago
- Code and yara rules to detect and analyze Cobalt Strike☆262Updated 3 years ago
- ☆222Updated 6 months ago
- ☆181Updated 2 years ago
- ☆257Updated last year
- Beta versions of my software☆245Updated last year
- A guide on how to write fast and memory friendly YARA rules☆126Updated last year
- Cobalt Strike Beacon configuration extractor and parser.☆145Updated 3 years ago
- ☆94Updated last month
- ☆290Updated 3 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆107Updated 7 months ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆98Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆572Updated 6 months ago
- ☆407Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆267Updated 3 weeks ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆220Updated 8 months ago
- Aims to identify sleeping beacons☆489Updated 5 months ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆91Updated 2 months ago