peasead / windows-sandbox-to-elasticLinks
Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.
☆50Updated last year
Alternatives and similar repositories for windows-sandbox-to-elastic
Users that are interested in windows-sandbox-to-elastic are comparing it to the libraries listed below
Sorting:
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- ☆33Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- AMSI detection PoC☆32Updated 5 years ago
- ☆18Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 4 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 3 years ago
- ☆17Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Repository for LNK stuff☆30Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Walking the PEB in VBA☆23Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Golang bindings for PE-sieve☆43Updated last year
- ☆12Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- A collection of my presentation materials.☆17Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- ☆17Updated 11 months ago
- ☆14Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆13Updated last year