secwest / fast-fwsignLinks
☆28Updated last year
Alternatives and similar repositories for fast-fwsign
Users that are interested in fast-fwsign are comparing it to the libraries listed below
Sorting:
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Updated 2 weeks ago
- ☆74Updated 3 months ago
- Linux #rootkit and #malware revealer☆30Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 5 months ago
- ☆64Updated last year
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Updated 4 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 3 years ago
- ☆23Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆20Updated 3 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆100Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 6 months ago
- Yara rules☆22Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Updated 10 months ago
- ☆18Updated last week
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 3 months ago
- ☆50Updated 5 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆36Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 4 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 5 years ago