pr0xylife / Qakbot
☆195Updated last year
Alternatives and similar repositories for Qakbot:
Users that are interested in Qakbot are comparing it to the libraries listed below
- ☆127Updated 2 weeks ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆280Updated 7 months ago
- Sigma rules to share with the community☆119Updated 2 months ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- ☆515Updated 6 months ago
- Rules generated from our investigations.☆194Updated 3 weeks ago
- MAL-CL (Malicious Command-Line)☆311Updated 2 years ago
- Active C&C Detector☆153Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆184Updated 3 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆250Updated 2 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆237Updated 2 weeks ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- IOC Collection 2022☆57Updated 2 years ago
- ☆130Updated last year
- Welcome to the SEKOIA.IO Community repository!☆147Updated this week
- ☆201Updated 5 months ago
- ☆160Updated last year
- ☆68Updated last month
- ☆96Updated 3 months ago
- A repository of my own Sigma detection rules.☆158Updated 7 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆561Updated 3 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆559Updated last month
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆150Updated 2 years ago
- Signatures and IoCs from public Volexity blog posts.☆352Updated 2 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆357Updated 3 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year