mattnotmax / hash_hunter
Command-line tool to search for malware samples in various repositories
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for hash_hunter
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- ☆34Updated last year
- Golang Implementation of Hell's gate☆15Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- ☆50Updated 6 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated last year
- Configuration Extractors for Malware☆53Updated 3 weeks ago
- AutoPoC Generator HoneyPoC☆32Updated 4 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆14Updated 4 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆64Updated 2 months ago
- Method of finding interesting domains using keywords + JARMs☆13Updated last year
- ☆24Updated 3 years ago
- ☆21Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆14Updated 2 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- ☆12Updated 11 months ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆21Updated 4 months ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆56Updated 6 years ago
- Continuous kerberoast monitor☆43Updated last year
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆17Updated 2 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago