pr0xylife / IcedID
☆33Updated last year
Alternatives and similar repositories for IcedID:
Users that are interested in IcedID are comparing it to the libraries listed below
- IOC Collection 2022☆57Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- ☆65Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Contains compiled binaries of Volatility☆33Updated 3 months ago
- ☆27Updated 3 years ago
- Detection rule validation☆41Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- ☆35Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Slides of my public talks☆55Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Lazarus analysis tools and research report☆56Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆24Updated 8 months ago
- ☆32Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- ☆68Updated 2 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Default Detections for EDR☆96Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Quick ESXi Log Parser☆19Updated 4 months ago
- ShellSweeping the evil.☆52Updated 10 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- ☆21Updated 2 years ago