sketchymoose / workslikeaJARM
Method of finding interesting domains using keywords + JARMs
☆13Updated 2 years ago
Alternatives and similar repositories for workslikeaJARM:
Users that are interested in workslikeaJARM are comparing it to the libraries listed below
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆18Updated 10 months ago
- Searching .evtx logs for remote connections☆24Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- ☆22Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- ☆12Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago
- ☆15Updated 4 months ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆16Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Collection of generic YARA rules☆15Updated 8 months ago
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago