securityjoes / ThreatResearchLinks
☆63Updated 2 years ago
Alternatives and similar repositories for ThreatResearch
Users that are interested in ThreatResearch are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆114Updated 2 years ago
- Detection rule validation☆41Updated last year
- Yara Rules for Modern Malware☆77Updated last year
- ☆136Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆125Updated last year
- ☆81Updated 7 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- ☆66Updated 2 years ago
- PowerShell Script Analyzer☆69Updated last year
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- ☆32Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆93Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- C2 Active Scanner☆59Updated last year
- Just my findings of malwares☆43Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- ☆55Updated 9 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆30Updated last year