mttaggart / wtfbinsLinks
WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.
☆166Updated 2 months ago
Alternatives and similar repositories for wtfbins
Users that are interested in wtfbins are comparing it to the libraries listed below
Sorting:
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆154Updated last year
- Full of public notes and Utilities☆113Updated 3 months ago
- Sigma rules to share with the community☆122Updated 4 months ago
- Active C&C Detector☆154Updated last year
- A repository to share publicly available Velociraptor detection content☆170Updated this week
- Repository of attack and defensive information for Business Email Compromise investigations☆252Updated 3 weeks ago
- ☆97Updated 3 months ago
- Windows Malware Investigation Scripts & Docs☆83Updated 6 months ago
- ☆247Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆251Updated last year
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆147Updated last year
- Takajō (鷹匠) is a Hayabusa results analyzer.☆121Updated this week
- ☆201Updated 7 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- Rules generated from our investigations.☆195Updated this week
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆90Updated 4 years ago
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 3 months ago
- ☆121Updated last year
- Notes on responding to security breaches relating to Azure AD☆111Updated 3 years ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆296Updated 3 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆133Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Retired TrustedSec Capabilities☆246Updated 6 months ago
- A repository of my own Sigma detection rules.☆160Updated 8 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated last month
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago