pr0xylife / Emotet
IOC Collection 2022
☆57Updated 2 years ago
Alternatives and similar repositories for Emotet:
Users that are interested in Emotet are comparing it to the libraries listed below
- ☆33Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Active C&C Detector☆152Updated last year
- Sigma rules to share with the community☆119Updated last month
- ☆30Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆96Updated 3 months ago
- ☆86Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆30Updated 3 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- ☆31Updated this week
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- Full of public notes and Utilities☆98Updated last month
- ☆47Updated 11 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ☆65Updated 3 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Yara Rules for Modern Malware☆73Updated last year
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Config files for my GitHub profile.☆14Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Default Detections for EDR☆96Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆110Updated 3 weeks ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago