pr0xylife / Pikabot
☆31Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Pikabot
- MS Graph Commands and Tools for Blue Teamers☆48Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆87Updated this week
- ☆36Updated 7 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- ☆29Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 3 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆38Updated 2 weeks ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- Just my findings of malwares☆39Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆109Updated 9 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- Default Detections for EDR☆94Updated 9 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆69Updated 3 weeks ago
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆30Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated 2 weeks ago
- ☆16Updated last year
- ☆34Updated 11 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 5 months ago
- ☆76Updated 6 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆35Updated 10 months ago
- IOC Collection 2022☆55Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- PowerShell Script Analyzer☆66Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆12Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 6 months ago