montysecurity / malware-bazaar-advanced-searchLinks
Script to chain search parameters for MalwareBazaar
☆12Updated 7 months ago
Alternatives and similar repositories for malware-bazaar-advanced-search
Users that are interested in malware-bazaar-advanced-search are comparing it to the libraries listed below
Sorting:
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- ☆18Updated last year
- ☆12Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated 2 years ago
- ☆54Updated 9 months ago
- A collection of my presentation materials.☆17Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- ☆31Updated 10 months ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- Make an Linux Kernel rootkit visible again.☆55Updated 6 months ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆34Updated last month
- ☆27Updated 9 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆19Updated last year
- Tool for obtaining information about PPL processes☆17Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 3 months ago
- Command and Control Framework using powershell implants☆35Updated 3 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆24Updated 3 years ago