votadlos / ZN2016Links
All Zero Nights 2016 'A threat hunter himself' stuff
☆16Updated 9 years ago
Alternatives and similar repositories for ZN2016
Users that are interested in ZN2016 are comparing it to the libraries listed below
Sorting:
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Some IR notes☆73Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated last year
- A python script used to parse the SAM registry hive.☆74Updated 7 years ago
- Passive DNS V2☆60Updated 11 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Updated 10 years ago
- Mitre chopshop network decoder framework☆30Updated 2 months ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 10 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆91Updated 9 months ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Updated 9 years ago
- ☆22Updated 8 years ago
- Automated install scripts for Cuckoo sandbox☆38Updated 8 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- Malware Repository Framework☆99Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- ☆25Updated 9 years ago
- ☆108Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Updated 2 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago