☆31Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for IcedID
Users that are interested in IcedID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Oct 3, 2024Updated last year
- IOC Collection 2022☆57Mar 7, 2023Updated 3 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last week
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Like DLP☆11Jan 27, 2025Updated last year
- Generate Ghidra class structures☆12Jan 3, 2020Updated 6 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- ☆512Oct 7, 2024Updated last year
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Jan 16, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A simple Powershell Module to help people managing Active Directory Shadow Group☆15May 15, 2019Updated 6 years ago
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 5 months ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆53Jan 11, 2023Updated 3 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- This is my attempt at creating "container" based solutions, where every folder is a solution to a question, problem or business need that…☆17Jan 31, 2025Updated last year
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Visualize Microsoft Defender XDR process trees and security events☆32Aug 24, 2025Updated 7 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- Tracing and parsing an executing binary file☆30Aug 7, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated last year
- ☆96May 5, 2025Updated 10 months ago
- Bosch HomeCom Easy integration for Home Assistant☆58Mar 19, 2026Updated last week
- Credit goes to Imran-Parray☆14Feb 15, 2022Updated 4 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- A graphical tool to easily manage the PKI certificate used by Windows Admin Center☆24Dec 17, 2024Updated last year