#batchfile #ioc #guide #cybersecurity #ransomware #infosec #pentesting #offensive_security #cobalt_strike #pentest_scripts #mitigation #ransomware_detection #redteaming #pentesting_tools
https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
GitHub
GitHub - ForbiddenProgrammer/conti-pentester-guide-leak: Leaked pentesting manuals given to Conti ransomware crooks
Leaked pentesting manuals given to Conti ransomware crooks - ForbiddenProgrammer/conti-pentester-guide-leak
#yara #all_in_one #antivirus #apk #elf #exe #linux #malware #malware_analysis #osx #packer #python3 #ransomware #security_tools #static_analysis #strings #suspicious_files #termux #threat_analysis #virustotal #windows
https://github.com/CYB3RMX/Qu1cksc0pe
https://github.com/CYB3RMX/Qu1cksc0pe
GitHub
GitHub - CYB3RMX/Qu1cksc0pe: All-in-One malware analysis tool.
All-in-One malware analysis tool. Contribute to CYB3RMX/Qu1cksc0pe development by creating an account on GitHub.
#python #ad_blocker #anti_virus #curated_sources #gambling_filter #hosts #malware #porn_filter #pornblocker #privacy #protection #python #ransomware #security #social_media_filter #trojans #unified_hosts
This repository combines multiple high-quality hosts files into one unified file to block malware, adware, and other unwanted content. It offers 31 different variants of hosts files, including options to block fake news, gambling, porn, and social media sites. You can generate your own customized hosts file using Docker, Python, or other methods. The benefits include improved security by blocking malicious sites, reduced ads, and enhanced privacy. The hosts file works on all major operating systems and can be easily updated and managed using various tools and scripts provided. This makes it a powerful tool for keeping your internet experience safer and more pleasant.
https://github.com/StevenBlack/hosts
This repository combines multiple high-quality hosts files into one unified file to block malware, adware, and other unwanted content. It offers 31 different variants of hosts files, including options to block fake news, gambling, porn, and social media sites. You can generate your own customized hosts file using Docker, Python, or other methods. The benefits include improved security by blocking malicious sites, reduced ads, and enhanced privacy. The hosts file works on all major operating systems and can be easily updated and managed using various tools and scripts provided. This makes it a powerful tool for keeping your internet experience safer and more pleasant.
https://github.com/StevenBlack/hosts
GitHub
GitHub - StevenBlack/hosts: 🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions…
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories. - StevenBlack/hosts
#yara #awesome_list #blueteam #blueteam_tools #cti #detection #detection_engineering #dfir #hacktools #incident_response #ioc #iocs #ir #ransomware #redteam #rmm #security #siem #soc #threat_hunting #threat_intelligence
You can access comprehensive security detection lists and threat hunting resources that help identify malicious activity across your infrastructure. These curated collections include indicators like suspicious file hashes, domain names, IP addresses, and behavioral patterns organized by threat type—from ransomware and phishing to command-and-control servers and vulnerable drivers. By integrating these lists into your security tools like SIEM platforms and endpoint detection systems, you gain immediate visibility into known threats while learning detection methodologies through guides and YARA rules. This accelerates your ability to hunt for compromises, validate security controls, and stay current with emerging attack techniques without building detection logic from scratch.
https://github.com/mthcht/awesome-lists
You can access comprehensive security detection lists and threat hunting resources that help identify malicious activity across your infrastructure. These curated collections include indicators like suspicious file hashes, domain names, IP addresses, and behavioral patterns organized by threat type—from ransomware and phishing to command-and-control servers and vulnerable drivers. By integrating these lists into your security tools like SIEM platforms and endpoint detection systems, you gain immediate visibility into known threats while learning detection methodologies through guides and YARA rules. This accelerates your ability to hunt for compromises, validate security controls, and stay current with emerging attack techniques without building detection logic from scratch.
https://github.com/mthcht/awesome-lists
GitHub
GitHub - mthcht/awesome-lists: Awesome Security lists for SOC/CERT/CTI
Awesome Security lists for SOC/CERT/CTI. Contribute to mthcht/awesome-lists development by creating an account on GitHub.