mandiant / Vulnerability-Disclosures
☆199Updated 5 months ago
Alternatives and similar repositories for Vulnerability-Disclosures:
Users that are interested in Vulnerability-Disclosures are comparing it to the libraries listed below
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆245Updated 2 years ago
- Emulate and Dissect MSF and *other* attacks☆140Updated last year
- A repository of previous info-sec presentations I've presented.☆160Updated 4 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆736Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆322Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- ☆130Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆115Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆487Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆202Updated last year
- ☆468Updated last year
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆264Updated 3 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆171Updated this week
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- ☆411Updated 2 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆164Updated 2 months ago
- A repo to support the book☆106Updated 3 years ago
- Beta versions of my software☆249Updated last year
- Run several volatility plugins at the same time☆113Updated 2 years ago
- ☆49Updated 2 years ago
- ☆295Updated 3 years ago
- ☆265Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆568Updated this week
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆127Updated 9 months ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago