sonofagl1tch / MalwareResearch
This directory contains random scripts from threat hunting or malware research
☆10Updated 6 years ago
Alternatives and similar repositories for MalwareResearch:
Users that are interested in MalwareResearch are comparing it to the libraries listed below
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆12Updated 3 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆15Updated 9 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- ☆10Updated 7 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆13Updated 7 years ago
- Repository of Information sharing on threats and indicators☆12Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 9 months ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- ☆16Updated 6 years ago
- ☆22Updated 4 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆30Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago