Commit Graph

1155 Commits

Author SHA1 Message Date
pe3zx
369406c1d9 Add 10 recent OSX/iOS/Mac malware samples 2018-09-23 18:44:21 +07:00
pe3zx
c2b3514c21 Add Mac Malware 2018-09-23 18:43:04 +07:00
pe3zx
95762c8f92 ashishb/android-malware 2018-09-23 18:41:45 +07:00
pe3zx
462aeb8b9d Add AndroMalShare 2018-09-23 18:40:40 +07:00
pe3zx
d6573128ad Add scumware.org 2018-09-23 18:39:04 +07:00
pe3zx
970685defe Add VX Vault 2018-09-23 18:37:36 +07:00
pe3zx
a96225b40b Add Malc0de database 2018-09-23 18:36:33 +07:00
pe3zx
51bb91dda9 Add SARVAN 2018-09-23 18:35:03 +07:00
pe3zx
e9c436043a Add malware.one 2018-09-23 18:32:28 +07:00
pe3zx
63755d2176 Add ViruSign 2018-09-23 18:31:18 +07:00
pe3zx
c2ffe5a591 Add VirusBay 2018-09-23 18:30:06 +07:00
pe3zx
cda141fad0 Add MalShare 2018-09-23 18:28:24 +07:00
pe3zx
dae21ab5cb Add AVCaesar 2018-09-23 18:25:59 +07:00
pe3zx
2da8cad42e Add Hybrid-Analysis 2018-09-23 18:24:28 +07:00
pe3zx
b4a5d14d78 Add contagio malware dump 2018-09-23 18:22:15 +07:00
pe3zx
cebe48618f trisf/theZoo 2018-09-23 18:04:37 +07:00
pe3zx
d8a99dd72c Add ThunderCls/xAnalyzer 2018-09-23 17:58:52 +07:00
pe3zx
e02d5d9dcc Add Cn33liz/p0wnedShell 2018-09-23 17:55:39 +07:00
pe3zx
4222889cee Add CVE-2018-3620 and CVE-2018-3646 2018-09-23 17:53:15 +07:00
pe3zx
6626016ed6 Add byt3bl33d3r/SprayingToolkit 2018-09-23 17:37:09 +07:00
pe3zx
813448d1f8 Add Exploitus 2018-09-23 17:34:51 +07:00
pe3zx
567edc808f Add Phishing Frenzy 2018-09-23 17:30:19 +07:00
pe3zx
392b5e7669 Add droidefense/engine 2018-09-23 17:27:12 +07:00
pe3zx
4e5fe97abf Add Compiler Explorer 2018-09-23 17:23:52 +07:00
pe3zx
da1b3d3db6 Add JPCERTCC/SysmonSearch 2018-09-23 13:21:13 +07:00
pe3zx
cf9c44448d Add APT Groups and Operations 2018-09-23 13:18:51 +07:00
pe3zx
1cd72adee9 Add Uncoder.io 2018-09-23 13:11:07 +07:00
pe3zx
c9b075baaf Add VSCMount 2018-09-23 13:09:07 +07:00
pe3zx
ed57a0a663 Add Google Dataset Search 2018-09-23 13:03:38 +07:00
pe3zx
7a766b4318 Add Neo23x0/exotron 2018-09-23 13:00:39 +07:00
pe3zx
df9831b119 Add mxmssh/drltrace 2018-09-23 12:57:12 +07:00
pe3zx
6ad9d83126 Add Heapple Pie - The macOS/iOS default heap 2018-09-22 17:55:26 +07:00
pe3zx
513e1fbc29 Add Apple File System Reference 2018-09-22 17:29:00 +07:00
pe3zx
3c5c85342f [Add] DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more 2018-08-26 22:53:13 +07:00
pe3zx
37ebbb52f5 [Add] ACTIVE DIRECTORY ATTACK - DCSHADOW 2018-08-26 22:48:51 +07:00
pe3zx
c9bb813f1d [Add] Hot Potato – Windows Privilege Escalation 2018-08-26 22:35:24 +07:00
pe3zx
011847e2ad [Add] DCShadow: Attacking Active Directory with Rogue DCs 2018-08-26 22:33:36 +07:00
pe3zx
6b69ed2ef2 [Add] Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents. 2018-08-26 22:00:52 +07:00
pe3zx
39022312ae [Add] felixweyne/imaginaryC2: Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. 2018-08-26 21:59:33 +07:00
pe3zx
c1927ee03f [Add] Wazuh: Open Source Host and Endpoint Security 2018-08-26 21:51:59 +07:00
pe3zx
1073b45323 [Add] gen0cide/gscript: framework to rapidly implement custom droppers for all three major operating systems 2018-08-21 23:22:47 +07:00
pe3zx
437cdbba2d Add syscall exploit for CVE-2018-8897 2018-08-21 23:18:53 +07:00
pe3zx
ad20f8b182 Tools: Malware Analysis: InQuest/python-iocextract 2018-08-21 23:11:57 +07:00
pe3zx
a2f8b38392 Tools: AWS Security: RhinoSecurityLabs/pacu 2018-08-21 23:08:50 +07:00
pe3zx
455f17179d Articles: Digital Forensics and Incident Response: Knowledge is Power! Using the macOS/iOS knowledgeC.db Database to Determine Precise User and Application Usage 2018-08-21 22:29:13 +07:00
pe3zx
61003171ab Articles: Digital Forensics and Incident Response: The Forensics of Cortana on Android 2018-08-21 22:28:05 +07:00
pe3zx
04c04a1fae Tools: Binary Analysis: Microsoft/binskim 2018-08-21 21:44:10 +07:00
pe3zx
1f6b3d06bd Articles: Malware Analysis: MikroTik Cryptojacking Campaigns 2018-08-21 21:28:57 +07:00
pe3zx
a1d439644b Tools: Social Engineering and OSINT: InQuest/omnibus 2018-08-21 21:23:05 +07:00
pe3zx
da088ef4d0 Articles: Tutorials: Emulating Decryption Function With Radare2 2018-08-21 21:16:50 +07:00