red_team_tool_countermeasures
Red team tool defenses
Provides countermeasures against various red team tools used by threat actors
3k stars
243 watching
846 forks
Language: YARA
last commit: 10 months ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
cluster25/detection | A collection of threat detection rules written in YARA | 13 |
advanced-threat-research/yara-rules | A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 573 |
bluscreenofjeff/red-team-infrastructure-wiki | A wiki providing resources and guidance on setting up resilient Red Team infrastructure for penetration testing and adversarial security assessments. | 4,167 |
f0wl/yara_rules | A collection of YARA rules for malware analysis and threat intelligence | 10 |
a-poc/redteam-tools | A collection of tools and resources for simulating a red teaming attack on computer systems. | 6,133 |
neo23x0/rules | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
fr0gger/yara-unprotect | A collection of Yara rules for detecting malware evasion techniques and malicious activity. | 25 |
qsecure-labs/overlord | Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 615 |
yara-rules/rules | A repository of Yara rules for detecting malware and other security threats | 4,215 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
imp0rtp3/yara-rules | A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
infosecn1nja/red-teaming-toolkit | A collection of tools to simulate an adversary's actions and test security controls | 9,158 |
filescanio/fsyara | A collection of YARA rules for detecting malware and other malicious files. | 9 |
ditekshen/detection | Detects malicious network and host activity using Yara, Snort, and ClamAV signatures. | 213 |
verizon/redshell | An interactive command-line interface for red teaming and pentesting | 209 |