pr0xylife / IcedIDView external linksLinks
☆31Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for IcedID
Users that are interested in IcedID are comparing it to the libraries listed below
Sorting:
- ☆15Oct 3, 2024Updated last year
- IOC Collection 2022☆57Mar 7, 2023Updated 2 years ago
- ☆194Feb 6, 2024Updated 2 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 5 months ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Jan 27, 2025Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- ☆513Oct 7, 2024Updated last year
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- ☆10Jan 26, 2026Updated 2 weeks ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- ☆152Feb 20, 2023Updated 2 years ago
- A Python interface to the Earthworm Seismic Data System.☆13Oct 4, 2024Updated last year
- Reproducible Analytical Pipeline of the Hospital Standardised Mortality Ratio (HSMR) quarterly publication☆11Jun 21, 2024Updated last year
- Where we learn together about MY₿ONK's NixOS automagic.☆15Dec 19, 2025Updated last month
- Postador Automático de Imagens no Facebook.☆10Feb 13, 2021Updated 5 years ago
- Active Directory Tiered Administration Model☆18Aug 2, 2025Updated 6 months ago
- The legacy CamlDBM library for accessing NDBM/GDBM database files☆12Jul 11, 2024Updated last year
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Repositório da Disciplina de Geoprocessamento - UFRPE☆13Mar 2, 2020Updated 5 years ago
- They Hunger reimplementation from scratch.☆12Dec 21, 2025Updated last month
- Script your gmail filters through a sieve-like language☆11Apr 15, 2020Updated 5 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆11Aug 7, 2021Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- A simple command line tool for statistical calculation☆10May 12, 2018Updated 7 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 8 months ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- ☆12Jan 21, 2024Updated 2 years ago
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆12Apr 4, 2024Updated last year
- repo do Diego☆10Nov 7, 2023Updated 2 years ago
- NVIDIA Compute Unified Device Architecture Toolkit☆15Feb 2, 2026Updated last week
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Jan 8, 2020Updated 6 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago