ninoseki / phishing_kits_2021
A dataset of phishing kits in the wild
☆15Updated 9 months ago
Alternatives and similar repositories for phishing_kits_2021:
Users that are interested in phishing_kits_2021 are comparing it to the libraries listed below
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- ☆22Updated 4 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Windows Security Logging☆43Updated 2 years ago
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- parsers to make life easier☆12Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- ☆41Updated 11 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Threat Mitigation Strategies☆25Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for insta…☆11Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Surface Analysis System on Cloud☆19Updated last year
- ☆12Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Tweettioc Splunk App☆20Updated 4 years ago