☆31Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for IcedID
Users that are interested in IcedID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Oct 3, 2024Updated last year
- IOC Collection 2022☆57Mar 7, 2023Updated 3 years ago
- ☆194Feb 6, 2024Updated 2 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated 3 weeks ago
- ☆27Nov 26, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- ☆510Oct 7, 2024Updated last year
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 10 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A simple Powershell Module to help people managing Active Directory Shadow Group☆15May 15, 2019Updated 6 years ago
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 6 months ago
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 7 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆24Jan 23, 2023Updated 3 years ago
- ☆14May 6, 2016Updated 9 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated last year
- Dashboard written in Python3 using Qt5 and PyQt5☆21Mar 22, 2017Updated 9 years ago
- ☆96Apr 8, 2026Updated last week
- Bosch HomeCom Easy integration for Home Assistant☆61Apr 8, 2026Updated last week
- Credit goes to Imran-Parray☆14Feb 15, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- A graphical tool to easily manage the PKI certificate used by Windows Admin Center☆24Dec 17, 2024Updated last year
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago