password123456 / CertVerify
A scanner that files with compromised or untrusted code signing certificates written in python.
☆66Updated last year
Alternatives and similar repositories for CertVerify
Users that are interested in CertVerify are comparing it to the libraries listed below
Sorting:
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆27Updated 5 months ago
- ☆48Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Malware Analysis tools☆26Updated 8 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Python wrappers for mal_unpack☆36Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆28Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 7 months ago
- ☆54Updated 5 months ago
- Lazarus analysis tools and research report☆56Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- ☆39Updated last year
- ☆22Updated last year
- ☆24Updated 2 years ago
- ☆42Updated 2 weeks ago
- ☆18Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated 10 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆46Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Search for c2 servers based on netlas☆39Updated last year
- Repository for archiving Cobalt Strike configuration☆30Updated this week
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year