rkovar / sunburstlookupsView external linksLinks
Quick lookup files for SUNBURST Backdoor
☆12Dec 15, 2020Updated 5 years ago
Alternatives and similar repositories for sunburstlookups
Users that are interested in sunburstlookups are comparing it to the libraries listed below
Sorting:
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 2 weeks ago
- ☆42Dec 22, 2020Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆55Mar 2, 2022Updated 3 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Test bench lab for Shellcode Obfuscation☆34Sep 2, 2025Updated 5 months ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆32May 25, 2024Updated last year
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41May 3, 2021Updated 4 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 2 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- ☆37Dec 17, 2020Updated 5 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Service to listen for Unifi motion events and download clips to a separate storage location☆12Feb 1, 2026Updated last week
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Sep 28, 2015Updated 10 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 5 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago