romainmarcoux / malicious-hash
Aggregation of lists of malicious hashes of malware that can be integrated into FortiGate firewalls and other products.
β24Updated this week
Alternatives and similar repositories for malicious-hash
Users that are interested in malicious-hash are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β73Updated 3 weeks ago
- β55Updated 11 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Managerβ19Updated 4 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β64Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logsβ120Updated 2 years ago
- β39Updated 4 months ago
- MS Graph Commands and Tools for Blue Teamersβ49Updated last year
- β32Updated last year
- Track C2 servers, tools, and botnets over time by framework and locationβ39Updated 3 months ago
- β74Updated last month
- Powershell tools used for Red Team / Pentesting.β76Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Groupβ87Updated 4 months ago
- β103Updated last year
- Intelligence DNS Blocklist : Phishing, Scam, Malicious DN, Malware Deliveryβ30Updated this week
- β48Updated last week
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Responsβ¦β54Updated 7 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ37Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTestβ14Updated 10 months ago
- Identify the accounts most vulnerable to dictionary attacksβ119Updated last month
- On-Premises Open Cyber Threat Intelligence Platformβ11Updated 6 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.β34Updated 9 months ago
- Really can protect from ransomware encryption?β45Updated 11 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It empβ¦β74Updated 2 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999β36Updated this week
- β62Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), aβ¦β51Updated 2 months ago
- A collection of CVEs weaponized by ransomware operatorsβ114Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β123Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β138Updated 2 months ago
- β37Updated last year