srlabs / black-basta-buster
☆97Updated last year
Alternatives and similar repositories for black-basta-buster:
Users that are interested in black-basta-buster are comparing it to the libraries listed below
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated 7 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆63Updated 3 weeks ago
- 🏴☠️💰 Another Ransomware gang tracker☆192Updated 2 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated 3 weeks ago
- MISP Playbooks☆198Updated 2 months ago
- Forensic Artifact Collection Tool Matrix☆83Updated 5 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- DFIR ORC PARSER PROJECT☆25Updated 2 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆142Updated 2 weeks ago
- ☆137Updated last month
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 5 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆127Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆237Updated last month
- ☆87Updated 2 months ago
- Jupyter Notebooks for the Blue Team☆145Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆168Updated 2 months ago
- Canary Detection☆168Updated last year
- ☆48Updated last week
- BlackBerry Threat Research & Intelligence☆98Updated last year
- ☆74Updated last month
- Just some lists of Malware Configs☆169Updated 3 months ago
- LOKI2 - Simple IOC and YARA Scanner☆92Updated 8 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆165Updated 3 weeks ago
- A tool for mapping cyber crime☆136Updated last week
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆57Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆285Updated 10 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- LotL RMM☆171Updated last month