pr0xylife / IcedIDLinks
☆33Updated last year
Alternatives and similar repositories for IcedID
Users that are interested in IcedID are comparing it to the libraries listed below
Sorting:
- IOC Collection 2022☆57Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- ☆66Updated 2 years ago
- ☆96Updated 2 months ago
- Linux Evidence Acquisition Framework☆119Updated 9 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Just my findings of malwares☆43Updated 2 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Lazarus analysis tools and research report☆56Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- Yara Rules for Modern Malware☆77Updated last year
- Open IOC sharing platform☆55Updated 8 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆114Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Notes and IoCs of fresh malware☆58Updated last year
- ☆27Updated 4 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆55Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- ☆33Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆95Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆30Updated last year
- Slides of my public talks☆56Updated last year
- ☆24Updated 3 years ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- ShellSweeping the evil.☆53Updated last year