sagarwani / APT32_OceanLotus_ThreatGroupView external linksLinks
All in one - Malware + Analysis by Cylance
☆11Nov 23, 2018Updated 7 years ago
Alternatives and similar repositories for APT32_OceanLotus_ThreatGroup
Users that are interested in APT32_OceanLotus_ThreatGroup are comparing it to the libraries listed below
Sorting:
- Useful windows tools for Blue, Red & Purple teams☆11Updated this week
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆35Dec 15, 2023Updated 2 years ago
- ☆41Apr 5, 2025Updated 10 months ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- BinView is a prototype for an application for binary data visualization. It can be used for analyzing large binary blocks and/or files, a…☆14Feb 16, 2015Updated 11 years ago
- ☆13Aug 28, 2021Updated 4 years ago
- 记录一些python写的好东西(不一定都是python的)☆10Nov 17, 2020Updated 5 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13May 4, 2020Updated 5 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- ☆10Jan 15, 2021Updated 5 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 2 years ago
- Yet another TCP proxy. Very simple to use -- just edit config file and run. Supports Linux, Freebsd and Windows; IPv4 and IPv6, Python 2…☆14Nov 30, 2012Updated 13 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- SolarWinds Orion API 远程代码执行漏洞批量检测脚本☆10Jan 5, 2021Updated 5 years ago
- Cookiecutter skeleton for minimal flask app☆10Jun 27, 2022Updated 3 years ago
- Deadlock killer library.☆14Jun 29, 2020Updated 5 years ago
- Build docker container for @MaskRay's pcap-search☆10Aug 2, 2018Updated 7 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago