☆31Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for IcedID
Users that are interested in IcedID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Oct 3, 2024Updated last year
- IOC Collection 2022☆57Mar 7, 2023Updated 3 years ago
- ☆191Feb 6, 2024Updated 2 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- ☆27Nov 26, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Config files for my GitHub profile.☆14May 7, 2023Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- ☆508Oct 7, 2024Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A simple Powershell Module to help people managing Active Directory Shadow Group☆15May 15, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- AWS X-Ray for Covert Command & Control☆46Oct 13, 2025Updated 6 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆53Jan 11, 2023Updated 3 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- This is my attempt at creating "container" based solutions, where every folder is a solution to a question, problem or business need that…☆17Jan 31, 2025Updated last year
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 8 months ago
- Structure aware fuzzing for network traffic packet captures☆13Nov 18, 2025Updated 5 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆22Jul 6, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆24Jan 23, 2023Updated 3 years ago
- ☆14May 6, 2016Updated 10 years ago
- Incident Response Report Using GitHub-Sphinx☆21Oct 28, 2019Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated last year
- Dashboard written in Python3 using Qt5 and PyQt5☆21Mar 22, 2017Updated 9 years ago
- ☆96Apr 8, 2026Updated 3 weeks ago
- Bosch HomeCom Easy integration for Home Assistant☆66Apr 24, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Apr 16, 2016Updated 10 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Sigma rules to share with the community☆125Jan 29, 2025Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago