mattreduce / eddieLinks
Eddie Vetter - triage macOS applications for security research
☆16Updated 4 years ago
Alternatives and similar repositories for eddie
Users that are interested in eddie are comparing it to the libraries listed below
Sorting:
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Updated 3 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- Notebooks created to attack and secure Active Directory environments☆28Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆22Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 6 years ago
- Collection of scripts used to analyse malware or emails☆20Updated 5 years ago
- Public repository for Red Canary Research☆37Updated 5 years ago
- HoneyDB Python Module☆14Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Work in Progress repo☆15Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 4 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- C# User Simulation☆33Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago