yarox24 / attack_monitor
Endpoint detection & Malware analysis software
☆225Updated 4 years ago
Related projects: ⓘ
- Automated Tactics Techniques & Procedures☆251Updated last year
- A malware analysis and classification tool.☆193Updated 2 years ago
- Miscellaneous Malware RE☆195Updated 2 years ago
- Test Blue Team detections without running any attack.☆269Updated 4 months ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆444Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆253Updated 5 years ago
- Awesome VirusTotal Intelligence Search Queries☆325Updated last year
- ☆278Updated 6 years ago
- Digital forensic acquisition tool for Windows based incident response.☆328Updated 4 months ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- ☆253Updated this week
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆207Updated 6 years ago
- Toolset for research malware and Cobalt Strike beacons☆205Updated last year
- Detecting ATT&CK techniques & tactics for Linux☆255Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆235Updated 3 years ago
- An open source script to perform malware static analysis on Portable Executable☆309Updated last year
- ☆344Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆245Updated last year
- Weaponizing Splunk with reverse and bind shells.☆172Updated 7 years ago
- ☆362Updated 2 months ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆391Updated 6 months ago
- Valhalla API Client☆62Updated last year
- A fully functional DanderSpritz lab in 2 commands☆418Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆280Updated 6 years ago
- Linux Incident Response☆89Updated 4 years ago
- Network Pivoting Toolkit☆431Updated last year
- Feed the tool a .nessus file and it will automatically get you MSF shell☆232Updated last year
- ☆333Updated last year
- Elemental - An ATT&CK Threat Library☆313Updated last year
- snake - a malware storage zoo☆217Updated last year