-
ossec-sysmon Public archive
A Ruleset to enhance detection capabilities of Ossec using Sysmon
-
velociraptor Public
Forked from Velocidex/velociraptorDigging Deeper....
Go Other UpdatedMay 6, 2021 -
cobaltstrike Public
Forked from Te-k/cobaltstrikeCode and yara rules to detect and analyze Cobalt Strike
Python MIT License UpdatedMay 5, 2021 -
lw-yara Public
Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies
-
calamity Public
A script to assist in processing forensic RAM captures for malware triage
-
-
-
-
Chimera Public
Forked from tokyoneon/ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
-
soc-threat-hunting Public
Repo of python/bash scripts for identifying IoC's in threat feed and other online tools
-
intel-sharing Public
Repository of Information sharing on threats and indicators
-
ShellPop Public
Forked from 0x00-0x00/ShellPopPop shells like a master.
Python MIT License UpdatedApr 2, 2019 -
atomic-red-team Public
Forked from redcanaryco/atomic-red-teamSmall and highly portable detection tests based on MITRE's ATT&CK.
PowerShell MIT License UpdatedDec 11, 2018 -
blazescan Public archive
Blazescan is a linux webserver malware scanning and incident response tool, with built in support for cPanel servers, but will run on any linux based server.
-
minerchk Public archive
Bash script to Check for malicious Cryptomining
-
-
Cortex-Analyzers Public
Forked from TheHive-Project/Cortex-AnalyzersCortex Analyzers Repository
-
ClamAV-CortexAnalyzer Public
Analyzer for TheHive Cortex Soc platform. Allows you to run observables against default and custom ClamAV rules.
-
dnscat2-powershell Public
Forked from lukebaggett/dnscat2-powershellA Powershell client for dnscat2, an encrypted DNS command and control tool.
PowerShell UpdatedJul 20, 2018 -
-
-
cryptojacking-scanner Public
Python scanner for scanning websites for crypto-jacking miners.
-
-
drupal-check Public
Tool to dive Apache logs for evidence of exploitation of CVE-2018-7600