shellcromancer / DaysOfYARA-2023Links
Rules Shared by the Community from 100 Days of YARA 2023 -
☆18Updated 2 years ago
Alternatives and similar repositories for DaysOfYARA-2023
Users that are interested in DaysOfYARA-2023 are comparing it to the libraries listed below
Sorting:
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- ☆15Updated 3 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated 11 months ago
- Random scripts for azure stuff☆12Updated 3 years ago
- ☆24Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- ☆12Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆42Updated 6 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 6 months ago
- ☆17Updated 8 months ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago
- ☆27Updated 11 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- ☆18Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- ☆16Updated 6 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- ☆27Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- ☆18Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago