mattnotmax / hash_hunter
Command-line tool to search for malware samples in various repositories
☆10Updated 3 years ago
Alternatives and similar repositories for hash_hunter:
Users that are interested in hash_hunter are comparing it to the libraries listed below
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆23Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆22Updated last year
- ☆26Updated 4 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆12Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- ☆24Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ProcDot Malware Sandbox☆22Updated 4 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆14Updated 2 years ago
- ☆22Updated last year
- ☆35Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆22Updated 4 years ago