silence-is-best / filesView external linksLinks
☆101Oct 14, 2024Updated last year
Alternatives and similar repositories for files
Users that are interested in files are comparing it to the libraries listed below
Sorting:
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 4 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆13Mar 4, 2019Updated 6 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- https://wojciechregula.blog/post/macos-red-teaming-get-ad-credentials-from-nomad/☆43Mar 4, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- c2 traffic☆195Feb 6, 2023Updated 3 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Nov 21, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Also known by Microsoft as Knifecoat☆1,151Dec 22, 2022Updated 3 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Oct 31, 2018Updated 7 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆24Oct 29, 2020Updated 5 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Assorted scripts and one off things☆271Aug 20, 2024Updated last year
- Defences against Cobalt Strike☆1,293Jul 14, 2022Updated 3 years ago
- ☆26Aug 6, 2021Updated 4 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆126Sep 19, 2019Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆12Sep 10, 2022Updated 3 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year