Upload 386 files
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- AADInternals.csv +0 -0
- ABPTTS.csv +11 -0
- ACLight.csv +25 -0
- AD exploitation cheat sheet.csv +66 -0
- AD-common-queries.csv +6 -0
- ADACLScanner.csv +21 -0
- ADAPE-Script.csv +28 -0
- ADCSCoercePotato.csv +17 -0
- ADCSKiller.csv +5 -0
- ADCSPwn.csv +13 -0
- ADCollector.csv +17 -0
- ADExplorerSnapshot.py.csv +4 -0
- ADFSDump-PS.csv +6 -0
- ADFSDump.csv +17 -0
- ADFSRelay.csv +12 -0
- ADFSpoof.csv +7 -0
- ADPassHunt.csv +16 -0
- ADSyncDecrypt.csv +5 -0
- AD_Enumeration_Hunt.csv +4 -0
- AD_Miner.csv +55 -0
- AMSI-Provider.csv +10 -0
- AMSITrigger.csv +20 -0
- AMSI_patch.csv +10 -0
- APCLdr.csv +4 -0
- APT.csv +2 -0
- APTSimulator.csv +2 -0
- ASPJinjaObfuscator.csv +10 -0
- ASREPRoast.csv +6 -0
- ATPMiniDump.csv +2 -0
- AVKiller.csv +12 -0
- AV_Evasion_Tool.csv +68 -0
- AWS-Loot.csv +9 -0
- AbandonedCOMKeys.csv +3 -0
- Accomplice.csv +36 -0
- Aclpwn.csv +2 -0
- ActiveScanPlusPlus.csv +4 -0
- Acunetix Web Vulnerability Scanner.csv +14 -0
- AdGuard VPN.csv +2 -0
- Adamantium-Thief.csv +17 -0
- Adblock Office VPN Proxy Server.csv +2 -0
- Adcheck.csv +23 -0
- Adeleginator.csv +25 -0
- Admin2Sys.csv +5 -0
- Advanced-SQL-Injection-Cheatsheet.csv +2 -0
- AdvancedRun.csv +2 -0
- Adzok.csv +7 -0
- AggressorScripts-1.csv +3 -0
- AhMyth-Android-RAT.csv +2 -0
- Ahk2Exe.csv +42 -0
- Airbash.csv +2 -0
AADInternals.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
ABPTTS.csv
ADDED
|
@@ -0,0 +1,11 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/ABPTTS.git*",".{0,1000}\/ABPTTS\.git.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","1","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 3 |
+
"*\ABPTTS-master*",".{0,1000}\\ABPTTS\-master.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","0","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 4 |
+
"*===[[[ A Black Path Toward The Sun ]]]===*",".{0,1000}\=\=\=\[\[\[\sA\sBlack\sPath\sToward\sThe\sSun\s\]\]\]\=\=\=.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","0","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 5 |
+
"*63688c4f211155c76f2948ba21ebaf83*",".{0,1000}63688c4f211155c76f2948ba21ebaf83.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","0","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 6 |
+
"*abpttsclient.py*",".{0,1000}abpttsclient\.py.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","1","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 7 |
+
"*ABPTTSClient-log.txt*",".{0,1000}ABPTTSClient\-log\.txt.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","1","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 8 |
+
"*abpttsfactory.py*",".{0,1000}abpttsfactory\.py.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","1","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 9 |
+
"*Building ABPTTS configuration *",".{0,1000}Building\sABPTTS\sconfiguration\s.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","0","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 10 |
+
"*nccgroup/ABPTTS*",".{0,1000}nccgroup\/ABPTTS.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","1","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
| 11 |
+
"*tQgGur6TFdW9YMbiyuaj9g6yBJb2tCbcgrEq*",".{0,1000}tQgGur6TFdW9YMbiyuaj9g6yBJb2tCbcgrEq.{0,1000}","offensive_tool_keyword","ABPTTS","TCP tunneling over HTTP/HTTPS for web application servers","T1071.001 - T1573","TA0003 - TA0011","N/A","N/A","Persistence","https://github.com/nccgroup/ABPTTS","1","0","N/A","N/A","9","8","726","150","2016-08-12T19:36:24Z","2016-07-29T21:45:57Z"
|
ACLight.csv
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* - Sensitive Accounts.csv*",".{0,1000}\s\-\sSensitive\sAccounts\.csv.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 3 |
+
"*/ACLight.git*",".{0,1000}\/ACLight\.git.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 4 |
+
"*/ACLight/*",".{0,1000}\/ACLight\/.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","N/A","N/A","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 5 |
+
"*\scanACLsResults.csv*",".{0,1000}\\scanACLsResults\.csv.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 6 |
+
"*Accounts with extra permissions.txt*",".{0,1000}Accounts\swith\sextra\spermissions\.txt.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 7 |
+
"*ACLight.ps1*",".{0,1000}ACLight\.ps1.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 8 |
+
"*ACLight.psd1*",".{0,1000}ACLight\.psd1.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 9 |
+
"*ACLight.psm1*",".{0,1000}ACLight\.psm1.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 10 |
+
"*ACLight2.ps1*",".{0,1000}ACLight2\.ps1.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 11 |
+
"*ACLight2.psd1*",".{0,1000}ACLight2\.psd1.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 12 |
+
"*ACLight2.psm1*",".{0,1000}ACLight2\.psm1.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 13 |
+
"*ACLight-master*",".{0,1000}ACLight\-master.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 14 |
+
"*cyberark/ACLight*",".{0,1000}cyberark\/ACLight.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 15 |
+
"*Execute-ACLight.bat*",".{0,1000}Execute\-ACLight\.bat.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 16 |
+
"*Execute-ACLight2.bat*",".{0,1000}Execute\-ACLight2\.bat.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","1","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 17 |
+
"*Invoke-ACLcsvFileAnalysis*",".{0,1000}Invoke\-ACLcsvFileAnalysis.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 18 |
+
"*Invoke-ACLScanner * -Filter *",".{0,1000}Invoke\-ACLScanner\s.{0,1000}\s\-Filter\s.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 19 |
+
"*Invoke-ACLScanner * -Name *",".{0,1000}Invoke\-ACLScanner\s.{0,1000}\s\-Name\s.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 20 |
+
"*Privileged Accounts - Layers Analysis.txt*",".{0,1000}Privileged\sAccounts\s\-\sLayers\sAnalysis\.txt.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 21 |
+
"*Privileged Accounts Permissions - Final Report.csv*",".{0,1000}Privileged\sAccounts\sPermissions\s\-\sFinal\sReport\.csv.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 22 |
+
"*Privileged Accounts Permissions - Irregular Accounts.csv*",".{0,1000}Privileged\sAccounts\sPermissions\s\-\sIrregular\sAccounts\.csv.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 23 |
+
"*Start-ACLsAnalysis -Domain*",".{0,1000}Start\-ACLsAnalysis\s\-Domain.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 24 |
+
"*Start-domainACLsAnalysis*",".{0,1000}Start\-domainACLsAnalysis.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
| 25 |
+
"*starting Multi-Layered ACLight scan*",".{0,1000}starting\sMulti\-Layered\sACLight\sscan.{0,1000}","offensive_tool_keyword","ACLight","A tool for advanced discovery of Privileged Accounts - including Shadow Admins.","T1087 - T1003 - T1208","TA0001 - TA0006 - TA0008","N/A","N/A","Discovery","https://github.com/cyberark/ACLight","1","0","N/A","AD Enumeration","7","8","786","143","2019-09-09T06:48:45Z","2017-05-17T09:29:41Z"
|
AD exploitation cheat sheet.csv
ADDED
|
@@ -0,0 +1,66 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* /user:* /domain:* /aes256:* /run:powershell.exe*",".{0,1000}\s\/user\:.{0,1000}\s\/domain\:.{0,1000}\s\/aes256\:.{0,1000}\s\/run\:powershell\.exe.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement with Mimikatz Overpass-the-hash a more opsec-safe version that uses the AES256 key (similar to with Rubeus above) - works for multiple Mimikatz commands","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 3 |
+
"* /user:* /domain:* /ntlm:* /run:powershell.exe*",".{0,1000}\s\/user\:.{0,1000}\s\/domain\:.{0,1000}\s\/ntlm\:.{0,1000}\s\/run\:powershell\.exe.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement with Mimikatz Overpass-the-hash (more risky than Rubeus writes to LSASS memory)","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 4 |
+
"* /user:* /domain:* /sid:S-1-5-21-* /krbtgt:* /id:* /groups:* /startoffset:0 /endin:600 /renewmax:10080 /ptt*",".{0,1000}\s\/user\:.{0,1000}\s\/domain\:.{0,1000}\s\/sid\:S\-1\-5\-21\-.{0,1000}\s\/krbtgt\:.{0,1000}\s\/id\:.{0,1000}\s\/groups\:.{0,1000}\s\/startoffset\:0\s\/endin\:600\s\/renewmax\:10080\s\/ptt.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement with Mimikatz Golden ticket (domain admin w/ some ticket properties to avoid detection)","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 5 |
+
"* -FakeDC * -SamAccountName * -Username *",".{0,1000}\s\-FakeDC\s.{0,1000}\s\-SamAccountName\s.{0,1000}\s\-Username\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","DCShadow is an attack that masks certain actions by temporarily imitating a Domain Controller. If you have Domain Admin or Enterprise Admin privileges in a root domain it can be used for forest-level persistence.","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 6 |
+
"* -Identity * -Set @{serviceprincipalname='*'}*",".{0,1000}\s\-Identity\s.{0,1000}\s\-Set\s\@\{serviceprincipalname\=\'.{0,1000}\'\}.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Targeted kerberoasting by setting SPN","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 7 |
+
"* -Identity * -XOR @{useraccountcontrol=4194304*",".{0,1000}\s\-Identity\s.{0,1000}\s\-XOR\s\@\{useraccountcontrol\=4194304.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Targeted kerberoasting we need ACL write permissions to set UserAccountControl flags for the target user. Using PowerView","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 8 |
+
"* lsass.dmp*",".{0,1000}\slsass\.dmp.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Dump LSASS memory through a process snapshot (-r) avoiding interacting with it directly","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 9 |
+
"* --no-http-server -smb2support -t * -c *",".{0,1000}\s\-\-no\-http\-server\s\-smb2support\s\-t\s.{0,1000}\s\-c\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Example command to relay the hash to authenticate as local admin (if the service account has these privileges) and run calc.exe. Omit the -c parameter to attempt a secretsdump instead.","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 10 |
+
"* server -p 80 --reverse --socks5*",".{0,1000}\sserver\s\-p\s80\s\-\-reverse\s\-\-socks5.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Chisel proxying - On our attacking machine (Linux in this case) we start a Chisel server on port 80 in reverse SOCKS5 mode.","T1071 - T1090 - T1102","N/A","N/A","N/A","C2","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 11 |
+
"*./chisel *",".{0,1000}\.\/chisel\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Chisel proxying - On our attacking machine (Linux in this case) we start a Chisel server on port 80 in reverse SOCKS5 mode.","T1071 - T1090 - T1102","N/A","N/A","N/A","C2","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 12 |
+
"*.exe asktgt /user:* /aes256:* /opsec /ptt*",".{0,1000}\.exe\sasktgt\s\/user\:.{0,1000}\s\/aes256\:.{0,1000}\s\/opsec\s\/ptt.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement with Rubeus More stealthy variant but requires the AES256 key (see 'Dumping OS credentials with Mimikatz' section)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 13 |
+
"*.exe asktgt /user:* /rc4:* /createnetonly:*cmd.exe*",".{0,1000}\.exe\sasktgt\s\/user\:.{0,1000}\s\/rc4\:.{0,1000}\s\/createnetonly\:.{0,1000}cmd\.exe.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement with Rubeus Pass the ticket to a sacrificial hidden process. allowing you to e.g. steal the token from this process (requires elevation)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 14 |
+
"*.exe asktgt /user:* /rc4:* /ptt*",".{0,1000}\.exe\sasktgt\s\/user\:.{0,1000}\s\/rc4\:.{0,1000}\s\/ptt.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement with Rubeus Request a TGT as the target user and pass it into the current session","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 15 |
+
"*.exe client *:* R:socks*",".{0,1000}\.exe\sclient\s.{0,1000}\:.{0,1000}\sR\:socks.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Chisel proxying - on our compromised target system we connect to this server and tell it to proxy all traffic over it via the reverse SOCKS5 tunnel.","T1071 - T1090 - T1102","N/A","N/A","N/A","C2","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 16 |
+
"*.exe dump /luid:0x5379f2 /nowrap*",".{0,1000}\.exe\sdump\s\/luid\:0x5379f2\s\/nowrap.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Unconstrained delegation Exploitation with Rubeus","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 17 |
+
"*.exe monitor /interval:5 /nowrap",".{0,1000}\.exe\smonitor\s\/interval\:5\s\/nowrap","offensive_tool_keyword","AD exploitation cheat sheet","Unconstrained delegation Exploitation with Rubeus","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 18 |
+
"*.exe ptt /ticket:*",".{0,1000}\.exe\sptt\s\/ticket\:.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Unconstrained delegation Exploitation with Rubeus","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 19 |
+
"*.exe s4u /ticket:* /impersonateuser:* /msdsspn:* /ptt*",".{0,1000}\.exe\ss4u\s\/ticket\:.{0,1000}\s\/impersonateuser\:.{0,1000}\s\/msdsspn\:.{0,1000}\s\/ptt.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Rubeus Use s4u2self and s4u2proxy to impersonate the DA user to the allowed SPN","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 20 |
+
"*.exe s4u /user:* /impersonateuser:* /msdsspn:* /altservice:ldap /ptt /rc4*",".{0,1000}\.exe\ss4u\s\/user\:.{0,1000}\s\/impersonateuser\:.{0,1000}\s\/msdsspn\:.{0,1000}\s\/altservice\:ldap\s\/ptt\s\/rc4.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Rubeus access the LDAP service on the DC (for dcsync)","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 21 |
+
"*.exe triage",".{0,1000}\.exe\striage","offensive_tool_keyword","AD exploitation cheat sheet","Unconstrained delegation Exploitation with Rubeus","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 22 |
+
"*.xp_dirtree *\*",".{0,1000}\.xp_dirtree\s.{0,1000}\\.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","If you have low-privileged access to a MSSQL database and no links are present you could potentially force NTLM authentication by using the xp_dirtree stored procedure to access this share. If this is successful the NetNTLM for the SQL service account can be collected and potentially cracked or relayed to compromise machines as that service account.","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 23 |
+
"*/rockyou.txt*",".{0,1000}\/rockyou\.txt.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Crack the hash with Hashcat","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 24 |
+
"*10k-worst-pass.txt*",".{0,1000}10k\-worst\-pass\.txt.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Crack with TGSRepCrack","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 25 |
+
"*Add-RemoteRegBackdoor*",".{0,1000}Add\-RemoteRegBackdoor.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Using DAMP toolkit We add the backdoor using the Add-RemoteRegBackdoor.ps1 cmdlet from DAMP.","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Persistence","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 26 |
+
"*Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed'*'NonPublic*Static').SetValue($null*$true)*",".{0,1000}Assembly\.GetType\(\'System\.Management\.Automation\.AmsiUtils\'\)\.GetField\(\'amsiInitFailed\'.{0,1000}\'NonPublic.{0,1000}Static\'\)\.SetValue\(\$null.{0,1000}\$true\).{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","PowerShell AMSI Bypass","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Defense Evasion","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 27 |
+
"*chisel.exe *",".{0,1000}chisel\.exe\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Chisel proxying - on our compromised target system we connect to this server and tell it to proxy all traffic over it via the reverse SOCKS5 tunnel.","T1071 - T1090 - T1102","N/A","N/A","N/A","C2","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 28 |
+
"*copy \*\HarddiskVolumeShadowCopy1\windows\system32\config\sam C:\*",".{0,1000}copy\s\\.{0,1000}\\HarddiskVolumeShadowCopy1\\windows\\system32\\config\\sam\sC\:\\.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Dumping secrets from a Volume Shadow Copy We can also create a Volume Shadow Copy of the SAM and SYSTEM files (which are always locked on the current system) so we can still copy them over to our local system. An elevated prompt is required for this.","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 29 |
+
"*copy \*\HarddiskVolumeShadowCopy1\windows\system32\config\system C:\*",".{0,1000}copy\s\\.{0,1000}\\HarddiskVolumeShadowCopy1\\windows\\system32\\config\\system\sC\:\\.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Dumping secrets from a Volume Shadow Copy We can also create a Volume Shadow Copy of the SAM and SYSTEM files (which are always locked on the current system) so we can still copy them over to our local system. An elevated prompt is required for this.","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 30 |
+
"*echo -n 'cmd /c start rundll32 *.dll* | base64*",".{0,1000}echo\s\-n\s\'cmd\s\/c\sstart\srundll32\s.{0,1000}\.dll.{0,1000}\s\|\sbase64.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Generate EncodedCommand","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Defense Evasion","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 31 |
+
"*Find-InterestingDomainAcl*",".{0,1000}Find\-InterestingDomainAcl.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement Enumeration With PowerView","T1595 - T1590 - T1591 - T1213 - T1039 - T1592","N/A","N/A","N/A","Lateral Movement","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 32 |
+
"*Find-LocalAdminAccess*",".{0,1000}Find\-LocalAdminAccess.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Lateral Movement Enumeration With PowerView","T1595 - T1590 - T1591 - T1213 - T1039 - T1592","N/A","N/A","N/A","Lateral Movement","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 33 |
+
"*Get-ASREPHash*",".{0,1000}Get\-ASREPHash.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","AS-REP roasting Get the hash for a roastable user using ASREPRoast.ps1","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 34 |
+
"*Get-DomainComputer -TrustedToAuth | select name",".{0,1000}Get\-DomainComputer\s\-TrustedToAuth\s\|\sselect\sname","offensive_tool_keyword","AD exploitation cheat sheet","msds-allowedtodelegateto*","T1595 - T1590 - T1591 - T1213 - T1039 - T1592","N/A","N/A","N/A","Lateral Movement","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 35 |
+
"*Get-DomainForeignGroupMember*",".{0,1000}Get\-DomainForeignGroupMember.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Abusing inter-forest trust Powersploit","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://powersploit.readthedocs.io/en/latest/Recon/Get-DomainForeignGroupMember/","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 36 |
+
"*Get-DomainUser -TrustedToAuth | select userprincipalname",".{0,1000}Get\-DomainUser\s\-TrustedToAuth\s\|\sselect\suserprincipalname","offensive_tool_keyword","AD exploitation cheat sheet","msds-allowedtodelegateto*","T1595 - T1590 - T1591 - T1213 - T1039 - T1592","N/A","N/A","N/A","Lateral Movement","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 37 |
+
"*Get-ItemProperty -Path HKLM:\Software\TightVNC\Server -Name *Password* | select -ExpandProperty Password*",".{0,1000}Get\-ItemProperty\s\-Path\sHKLM\:\\Software\\TightVNC\\Server\s\-Name\s.{0,1000}Password.{0,1000}\s\|\sselect\s\-ExpandProperty\sPassword.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","TightVNC password (convert to Hex then decrypt with e.g.: https://github.com/frizb/PasswordDecrypts)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 38 |
+
"*Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\Lsa -Name *RunAsPPL*",".{0,1000}Get\-ItemProperty\s\-Path\sHKLM\:\\SYSTEM\\CurrentControlSet\\Control\\Lsa\s\-Name\s.{0,1000}RunAsPPL.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Sometimes LSASS is configured to run as a protected process (PPL). You can query this with PowerShell as follows.","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Discovery","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 39 |
+
"*Get-RemoteCachedCredential*",".{0,1000}Get\-RemoteCachedCredential.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Get cached credentials (if any)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 40 |
+
"*Get-RemoteLocalAccountHash*",".{0,1000}Get\-RemoteLocalAccountHash.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Get local account hashes","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 41 |
+
"*Get-RemoteMachineAccountHash*",".{0,1000}Get\-RemoteMachineAccountHash.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Get machine account hash for silver ticket attack","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 42 |
+
"*Get-SqlServerLinkCrawl*",".{0,1000}Get\-SqlServerLinkCrawl.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Automatically find all linked databases","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 43 |
+
"*impacket-wmiexec*",".{0,1000}impacket\-wmiexec.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Command execution with WMI From Linux","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 44 |
+
"*incognito* list_tokens -u*",".{0,1000}incognito.{0,1000}\slist_tokens\s\-u.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Token Manipulation Tokens can be impersonated from other users with a session/running processes on the machine. Most C2 frameworks have functionality for this built-in (such as the Steal Token functionality in Cobalt Strike)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 45 |
+
"*incognito.exe*",".{0,1000}incognito\.exe.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Token Manipulation Tokens can be impersonated from other users with a session/running processes on the machine. Most C2 frameworks have functionality for this built-in (such as the Steal Token functionality in Cobalt Strike)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 46 |
+
"*Invoke-AllChecks*",".{0,1000}Invoke\-AllChecks.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Check for vulnerable programs and configs","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 47 |
+
"*Invoke-ServiceAbuse*",".{0,1000}Invoke\-ServiceAbuse.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Exploit vulnerable service permissions (does not require touching disk)","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 48 |
+
"*Invoke-SQLAudit*",".{0,1000}Invoke\-SQLAudit.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Scan for MSSQL misconfigurations to escalate to System Admin","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://stealthbits.com/blog/compromise-powerupsql-sql-attacks/","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 49 |
+
"*Invoke-SQLOSCmd -Instance * -Command *",".{0,1000}Invoke\-SQLOSCmd\s\-Instance\s.{0,1000}\s\-Command\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Run command (enables XP_CMDSHELL automatically if required)","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 50 |
+
"*Invoke-TokenManipulation*",".{0,1000}Invoke\-TokenManipulation.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Invoke-TokenManipulation script Tokens can be impersonated from other users with a session/running processes on the machine. Most C2 frameworks have functionality for this built-in (such as the Steal Token functionality in Cobalt Strike)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 51 |
+
"*lsass.dmp*",".{0,1000}lsass\.dmp.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Dump LSASS memory through a process snapshot (-r) avoiding interacting with it directly","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 52 |
+
"*MS-RPRN.exe *",".{0,1000}MS\-RPRN\.exe\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Unconstrained delegation From attacking machine entice the Domain Controller to connect using the printer bug. Binary from here https://github.com/leechristensen/SpoolSample","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 53 |
+
"*mssqlsvc.kirbi*",".{0,1000}mssqlsvc\.kirbi.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Crack with TGSRepCrack","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 54 |
+
"*ntlmrelayx --*",".{0,1000}ntlmrelayx\s\-\-.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Example command to relay the hash to authenticate as local admin (if the service account has these privileges) and run calc.exe. Omit the -c parameter to attempt a secretsdump instead.","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 55 |
+
"*procdump.exe*lsass*",".{0,1000}procdump\.exe.{0,1000}lsass.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Dump LSASS memory through a process snapshot (-r) avoiding interacting with it directly","T1003.001","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 56 |
+
"*pwd*/*/rules/best64.rule*",".{0,1000}pwd.{0,1000}\/.{0,1000}\/rules\/best64\.rule.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Crack the hash with Hashcat","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 57 |
+
"*Set-DCShadowPermissions*",".{0,1000}Set\-DCShadowPermissions.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","DCShadow is an attack that masks certain actions by temporarily imitating a Domain Controller. If you have Domain Admin or Enterprise Admin privileges in a root domain it can be used for forest-level persistence.","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 58 |
+
"*Set-DomainObject*",".{0,1000}Set\-DomainObject.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Targeted kerberoasting by setting SPN","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 59 |
+
"*sET-ItEM ( 'V'+'aR' + 'IA' + 'blE:1q2' + 'uZx'*",".{0,1000}sET\-ItEM\s\(\s\'V\'\+\'aR\'\s\+\s\s\'IA\'\s\+\s\'blE\:1q2\'\s\s\+\s\'uZx\'.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","PowerShell AMSI Bypass Obfuscation example for copy-paste purposes","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Defense Evasion","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 60 |
+
"*SharpBypassUAC*",".{0,1000}SharpBypassUAC.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Use SharpBypassUAC e.g. from a CobaltStrike beacon","T1558.001 - T1078.002 - T1550.003","TA0008 - TA0009 - TA0003","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 61 |
+
"*tgsrepcrack.*",".{0,1000}tgsrepcrack\..{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Crack with TGSRepCrack","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 62 |
+
"*token* -CreateProcess * -ProcessId *",".{0,1000}token.{0,1000}\s\-CreateProcess\s.{0,1000}\s\-ProcessId\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Start new process with token of a specific user. Tokens can be impersonated from other users with a session/running processes on the machine. Most C2 frameworks have functionality for this built-in (such as the Steal Token functionality in Cobalt Strike)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 63 |
+
"*token* -ImpersonateUser -Username *",".{0,1000}token.{0,1000}\s\-ImpersonateUser\s\-Username\s.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Start new process with token of a specific user. Tokens can be impersonated from other users with a session/running processes on the machine. Most C2 frameworks have functionality for this built-in (such as the Steal Token functionality in Cobalt Strike)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 64 |
+
"*use incognito*",".{0,1000}use\sincognito.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Token Manipulation Tokens can be impersonated from other users with a session/running processes on the machine. Most C2 frameworks have functionality for this built-in (such as the Steal Token functionality in Cobalt Strike)","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 65 |
+
"*wmic shadowcopy call create Volume='C:\'*",".{0,1000}wmic\sshadowcopy\scall\screate\sVolume\=\'C\:\\\'.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Dumping secrets from a Volume Shadow Copy We can also create a Volume Shadow Copy of the SAM and SYSTEM files (which are always locked on the current system) so we can still copy them over to our local system. An elevated prompt is required for this.","T1110","TA0006","N/A","N/A","Credential Access","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","0","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
| 66 |
+
"*Write-ServiceBinary*",".{0,1000}Write\-ServiceBinary.{0,1000}","offensive_tool_keyword","AD exploitation cheat sheet","Exploit an unquoted service path vulnerability to spawn a beacon","T1550 - T1555 - T1212 - T1558","N/A","N/A","N/A","Exploitation tool","https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference","1","1","N/A","N/A","N/A","N/A","N/A","N/A","N/A","N/A"
|
AD-common-queries.csv
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AD-common-queries.git*",".{0,1000}\/AD\-common\-queries\.git.{0,1000}","greyware_tool_keyword","AD-common-queries","Collection of common ADSI queries for Domain Account enumeration","T1087 - T1087.002 - T1018 - T1069 - T1069.002 - T1069.003 - T1133 - T1139","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/swarleysez/AD-common-queries","1","1","N/A","N/A","8","1","5","3","2020-05-24T03:23:09Z","2020-03-10T19:43:51Z"
|
| 3 |
+
"*ADUsers-Disabled.txt*",".{0,1000}ADUsers\-Disabled\.txt.{0,1000}","greyware_tool_keyword","AD-common-queries","Collection of common ADSI queries for Domain Account enumeration","T1087 - T1087.002 - T1018 - T1069 - T1069.002 - T1069.003 - T1133 - T1139","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/swarleysez/AD-common-queries","1","0","N/A","N/A","8","1","5","3","2020-05-24T03:23:09Z","2020-03-10T19:43:51Z"
|
| 4 |
+
"*ADUsers-PasswordNeverExpires.txt*",".{0,1000}ADUsers\-PasswordNeverExpires\.txt.{0,1000}","greyware_tool_keyword","AD-common-queries","Collection of common ADSI queries for Domain Account enumeration","T1087 - T1087.002 - T1018 - T1069 - T1069.002 - T1069.003 - T1133 - T1139","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/swarleysez/AD-common-queries","1","0","N/A","N/A","8","1","5","3","2020-05-24T03:23:09Z","2020-03-10T19:43:51Z"
|
| 5 |
+
"*ADUsers-PasswordNotRequired.txt*",".{0,1000}ADUsers\-PasswordNotRequired\.txt.{0,1000}","greyware_tool_keyword","AD-common-queries","Collection of common ADSI queries for Domain Account enumeration","T1087 - T1087.002 - T1018 - T1069 - T1069.002 - T1069.003 - T1133 - T1139","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/swarleysez/AD-common-queries","1","0","N/A","N/A","8","1","5","3","2020-05-24T03:23:09Z","2020-03-10T19:43:51Z"
|
| 6 |
+
"*swarleysez/AD-common-queries*",".{0,1000}swarleysez\/AD\-common\-queries.{0,1000}","greyware_tool_keyword","AD-common-queries","Collection of common ADSI queries for Domain Account enumeration","T1087 - T1087.002 - T1018 - T1069 - T1069.002 - T1069.003 - T1133 - T1139","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/swarleysez/AD-common-queries","1","1","N/A","N/A","8","1","5","3","2020-05-24T03:23:09Z","2020-03-10T19:43:51Z"
|
ADACLScanner.csv
ADDED
|
@@ -0,0 +1,21 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*.ps1 -Base *OU=*DC=* -Credentials * -Server *",".{0,1000}\.ps1\s\-Base\s.{0,1000}OU\=.{0,1000}DC\=.{0,1000}\s\-Credentials\s.{0,1000}\s\-Server\s.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 3 |
+
"*/ADACLScanner.git*",".{0,1000}\/ADACLScanner\.git.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","1","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 4 |
+
"*_adAclOutput*.csv*",".{0,1000}_adAclOutput.{0,1000}\.csv.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 5 |
+
"*_adAclOutput*.csv*",".{0,1000}_adAclOutput.{0,1000}\.csv.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 6 |
+
"*_adAclOutput*.csv*",".{0,1000}_adAclOutput.{0,1000}\.csv.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 7 |
+
"*_adAclOutput*.csv*",".{0,1000}_adAclOutput.{0,1000}\.csv.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 8 |
+
"*_adAclOutput*.csv*",".{0,1000}_adAclOutput.{0,1000}\.csv.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 9 |
+
"*_adAclOutput*.xlsx*",".{0,1000}_adAclOutput.{0,1000}\.xlsx.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 10 |
+
"*3ECA4B56CE358B13E1128A1E6149ED07CA0A8C55997B50A1E2C4EA46BD586B84*",".{0,1000}3ECA4B56CE358B13E1128A1E6149ED07CA0A8C55997B50A1E2C4EA46BD586B84.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 11 |
+
"*4E0CA74F5E074DFF389263D15E3913750EB437C1C3CD3B212C2998352023B980*",".{0,1000}4E0CA74F5E074DFF389263D15E3913750EB437C1C3CD3B212C2998352023B980.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 12 |
+
"*555662D4CCBB940D87869E6295EC7CC74BB85D8C8FC5916EC34D1226704578C5*",".{0,1000}555662D4CCBB940D87869E6295EC7CC74BB85D8C8FC5916EC34D1226704578C5.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 13 |
+
"*6973A4710FD88D32D47F4523E7EC098EF407F8ECED4B34AF6D3759CE1696EF19*",".{0,1000}6973A4710FD88D32D47F4523E7EC098EF407F8ECED4B34AF6D3759CE1696EF19.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 14 |
+
"*6BF82CF9845C649557FC02D1E3D0B6A9FB4F827CC7815BF477DD0CB51246DA45*",".{0,1000}6BF82CF9845C649557FC02D1E3D0B6A9FB4F827CC7815BF477DD0CB51246DA45.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 15 |
+
"*9AC25A8825407CCB6089BC7A2DF530D1830795B7E71A981ECEE4C5F48387B37A*",".{0,1000}9AC25A8825407CCB6089BC7A2DF530D1830795B7E71A981ECEE4C5F48387B37A.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 16 |
+
"*ADACLScan.ps1*",".{0,1000}ADACLScan\.ps1.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","1","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 17 |
+
"*ADACLScanner*",".{0,1000}ADACLScanner.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 18 |
+
"*ADACLScanner-master*",".{0,1000}ADACLScanner\-master.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","1","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 19 |
+
"*B5A3FA5B3DA95F6AA7556EE2BC62E5D290F72453105EF88E170174994DDA2650*",".{0,1000}B5A3FA5B3DA95F6AA7556EE2BC62E5D290F72453105EF88E170174994DDA2650.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 20 |
+
"*canix1/ADACLScanner*",".{0,1000}canix1\/ADACLScanner.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","1","N/A","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
| 21 |
+
"*F8E0A09D99FF46019C0C3F2B725E9887D9AE53CB7FAD0BB233BC8612C2CA51F2*",".{0,1000}F8E0A09D99FF46019C0C3F2B725E9887D9AE53CB7FAD0BB233BC8612C2CA51F2.{0,1000}","offensive_tool_keyword","ADACLScanner","A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory .","T1222 - T1069 - T1018","TA0002 - TA0007 - TA0043","N/A","N/A","Discovery","https://github.com/canix1/ADACLScanner","1","0","#filehash","AD Enumeration","7","10","956","161","2024-09-13T12:21:31Z","2017-04-06T12:28:37Z"
|
ADAPE-Script.csv
ADDED
|
@@ -0,0 +1,28 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* ""Sniffy boi sniffin""*",".{0,1000}\s\""Sniffy\sboi\ssniffin\"".{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 3 |
+
"* ADAPE.ps1*",".{0,1000}\sADAPE\.ps1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 4 |
+
"*$Kerberoast*",".{0,1000}\$Kerberoast.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 5 |
+
"*.ps1 -GPP -PView -Kerberoast*",".{0,1000}\.ps1\s\-GPP\s\-PView\s\-Kerberoast.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 6 |
+
"*.ps1 -PrivEsc*",".{0,1000}\.ps1\s\-PrivEsc.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 7 |
+
"*/ADAPE.ps1*",".{0,1000}\/ADAPE\.ps1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 8 |
+
"*/ADAPE-Script.git*",".{0,1000}\/ADAPE\-Script\.git.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 9 |
+
"*/Inveigh.ps1*",".{0,1000}\/Inveigh\.ps1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 10 |
+
"*/PowerUp.ps1*",".{0,1000}\/PowerUp\.ps1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 11 |
+
"*/PowerView.ps1*",".{0,1000}\/PowerView\.ps1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 12 |
+
"*/PrivEsc.psm1*",".{0,1000}\/PrivEsc\.psm1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 13 |
+
"*/PView.psm1*",".{0,1000}\/PView\.psm1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 14 |
+
"*\ADAPE.ps1*",".{0,1000}\\ADAPE\.ps1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 15 |
+
"*\ExploitableSystem.txt*",".{0,1000}\\ExploitableSystem\.txt.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 16 |
+
"*\PrivEsc.txt*",".{0,1000}\\PrivEsc\.txt.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 17 |
+
"*\ShareFinder.txt*",".{0,1000}\\ShareFinder\.txt.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 18 |
+
"*7f99e59cb3242638aa4967180674b98dd770fae51a85ff364238faf52e02a586*",".{0,1000}7f99e59cb3242638aa4967180674b98dd770fae51a85ff364238faf52e02a586.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","#filehash","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 19 |
+
"*Attemping WPAD, LLMNR, and NBTNS poisoning*",".{0,1000}Attemping\sWPAD,\sLLMNR,\sand\sNBTNS\spoisoning.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 20 |
+
"*Author: @haus3c*",".{0,1000}Author\:\s\@haus3c.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 21 |
+
"*Collecting Privesc methods*",".{0,1000}Collecting\sPrivesc\smethods.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 22 |
+
"*function PrivEsc*",".{0,1000}function\sPrivEsc.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 23 |
+
"*Get-ExploitableSystem -Verbose*",".{0,1000}Get\-ExploitableSystem\s\-Verbose.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 24 |
+
"*Get-GPPPassword.ps1*",".{0,1000}Get\-GPPPassword\.ps1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 25 |
+
"*hausec/ADAPE-Script*",".{0,1000}hausec\/ADAPE\-Script.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 26 |
+
"*Import-Module */PView.psm1*",".{0,1000}Import\-Module\s.{0,1000}\/PView\.psm1.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 27 |
+
"*Invoke-Kerberoast*",".{0,1000}Invoke\-Kerberoast.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","1","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
| 28 |
+
"*Invoke-ShareFinder -CheckShareAccess*",".{0,1000}Invoke\-ShareFinder\s\-CheckShareAccess.{0,1000}","offensive_tool_keyword","ADAPE-Script","Active Directory Assessment and Privilege Escalation Script","T1178 - T1087 - T1482","TA0002 - TA0004 - TA0007","N/A","N/A","Privilege Escalation","https://github.com/cjoan75/ADAPE-Script","1","0","N/A","N/A","8","1","0","0","2020-07-11T00:53:24Z","2020-08-09T16:52:35Z"
|
ADCSCoercePotato.csv
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*.asp --adcs --template Machine -smb2support*",".{0,1000}\.asp\s\-\-adcs\s\-\-template\sMachine\s\-smb2support.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 3 |
+
"*/ADCSCoercePotato.git*",".{0,1000}\/ADCSCoercePotato\.git.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","1","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 4 |
+
"*/ADCSCoercePotato/*",".{0,1000}\/ADCSCoercePotato\/.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","1","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 5 |
+
"*[!] Couldn't communicate with the fake RPC Server*",".{0,1000}\[!\]\sCouldn\'t\scommunicate\swith\sthe\sfake\sRPC\sServer.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","#content","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 6 |
+
"*[+] Got NTLM type 3 AUTH message from * with hostname *",".{0,1000}\[\+\]\sGot\sNTLM\stype\s3\sAUTH\smessage\sfrom\s.{0,1000}\s\swith\shostname\s.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","#content","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 7 |
+
"*\ADCSCoercePotato\*",".{0,1000}\\ADCSCoercePotato\\.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 8 |
+
"*\MSFRottenPotato.h*",".{0,1000}\\MSFRottenPotato\.h.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 9 |
+
"*4164003E-BA47-4A95-8586-D5AAC399C050*",".{0,1000}4164003E\-BA47\-4A95\-8586\-D5AAC399C050.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","#GUIDproject","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 10 |
+
"*ADCSCoercePotato.cpp*",".{0,1000}ADCSCoercePotato\.cpp.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","1","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 11 |
+
"*ADCSCoercePotato.exe*",".{0,1000}ADCSCoercePotato\.exe.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","1","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 12 |
+
"*ADCSCoercePotato.sln*",".{0,1000}ADCSCoercePotato\.sln.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","1","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 13 |
+
"*ADCSCoercePotato.vcxproj*",".{0,1000}ADCSCoercePotato\.vcxproj.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","1","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 14 |
+
"*ADCSCoercePotato\n- @decoder_it 2024\*",".{0,1000}ADCSCoercePotato\\n\-\s\@decoder_it\s2024\\.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 15 |
+
"*decoder-it/ADCSCoercePotato*",".{0,1000}decoder\-it\/ADCSCoercePotato.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","1","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 16 |
+
"*include ""MSFRottenPotato.h""*",".{0,1000}include\s\""MSFRottenPotato\.h\"".{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
| 17 |
+
"*int PotatoAPI::findNTLMBytes*",".{0,1000}int\sPotatoAPI\:\:findNTLMBytes.{0,1000}","offensive_tool_keyword","ADCSCoercePotato","coercing machine authentication but specific for ADCS server","T1187","TA0006","N/A","N/A","Credential Access","https://github.com/decoder-it/ADCSCoercePotato","1","0","N/A","N/A","10","3","206","29","2024-05-05T14:42:23Z","2024-02-26T12:08:34Z"
|
ADCSKiller.csv
ADDED
|
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/ADCSKiller*",".{0,1000}\/ADCSKiller.{0,1000}","offensive_tool_keyword","ADCSKiller","ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure","T1552.004 - T1003.003 - T1114.002 - T1649","TA0006 - TA0003 - TA0005","N/A","N/A","Exploitation tool","https://github.com/grimlockx/ADCSKiller","1","1","N/A","N/A","N/A","7","699","70","2023-05-19T17:36:37Z","2023-05-19T06:51:41Z"
|
| 3 |
+
"*adcskiller.py*",".{0,1000}adcskiller\.py.{0,1000}","offensive_tool_keyword","ADCSKiller","ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure","T1552.004 - T1003.003 - T1114.002 - T1649","TA0006 - TA0003 - TA0005","N/A","N/A","Exploitation tool","https://github.com/grimlockx/ADCSKiller","1","1","N/A","N/A","N/A","7","699","70","2023-05-19T17:36:37Z","2023-05-19T06:51:41Z"
|
| 4 |
+
"*ly4k/Certipy*",".{0,1000}ly4k\/Certipy.{0,1000}","offensive_tool_keyword","ADCSKiller","ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure","T1552.004 - T1003.003 - T1114.002 - T1649","TA0006 - TA0003 - TA0005","N/A","N/A","Exploitation tool","https://github.com/grimlockx/ADCSKiller","1","1","N/A","N/A","N/A","7","699","70","2023-05-19T17:36:37Z","2023-05-19T06:51:41Z"
|
| 5 |
+
"*p0dalirius/Coercer*",".{0,1000}p0dalirius\/Coercer.{0,1000}","offensive_tool_keyword","ADCSKiller","ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure","T1552.004 - T1003.003 - T1114.002 - T1649","TA0006 - TA0003 - TA0005","N/A","N/A","Exploitation tool","https://github.com/grimlockx/ADCSKiller","1","1","N/A","N/A","N/A","7","699","70","2023-05-19T17:36:37Z","2023-05-19T06:51:41Z"
|
ADCSPwn.csv
ADDED
|
@@ -0,0 +1,13 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*.exe --adcs * --remote *",".{0,1000}\.exe\s\-\-adcs\s.{0,1000}\s\-\-remote\s.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","0","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 3 |
+
"*/ADCSPwn.git*",".{0,1000}\/ADCSPwn\.git.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","1","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 4 |
+
"*\ADCSPwn*",".{0,1000}\\ADCSPwn.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","0","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 5 |
+
"*>ADCSPwn<*",".{0,1000}\>ADCSPwn\<.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","0","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 6 |
+
"*0bb4b892f67fdf903ed5e5df2c85c5ccb71669c298736cf24284412de435509a*",".{0,1000}0bb4b892f67fdf903ed5e5df2c85c5ccb71669c298736cf24284412de435509a.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","0","#filehash","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 7 |
+
"*980EF05F-87D1-4A0A-932A-582FB1BC3AC3*",".{0,1000}980EF05F\-87D1\-4A0A\-932A\-582FB1BC3AC3.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","0","#GUIDproject","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 8 |
+
"*ADCSPwn.csproj*",".{0,1000}ADCSPwn\.csproj.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","1","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 9 |
+
"*ADCSPwn.exe*",".{0,1000}ADCSPwn\.exe.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","1","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 10 |
+
"*ADCSPwn.sln*",".{0,1000}ADCSPwn\.sln.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","1","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 11 |
+
"*ADCSPwn.zip*",".{0,1000}ADCSPwn\.zip.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","1","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 12 |
+
"*ADCSPwn-master*",".{0,1000}ADCSPwn\-master.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","1","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
| 13 |
+
"*bats3c/ADCSPwn*",".{0,1000}bats3c\/ADCSPwn.{0,1000}","offensive_tool_keyword","ADCSPwn","A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service","T1550.002 - T1078.003 - T1110.003 - T1649","TA0004 - TA0006","N/A","N/A","Privilege Escalation","https://github.com/bats3c/ADCSPwn","1","1","N/A","N/A","10","9","816","122","2023-03-20T20:30:40Z","2021-07-30T15:04:41Z"
|
ADCollector.csv
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* --LocalGMEnum --Host *",".{0,1000}\s\s\-\-LocalGMEnum\s\-\-Host\s.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 3 |
+
"* ADCollector.exe*",".{0,1000}\sADCollector\.exe.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 4 |
+
"* --SessionEnum --Host *",".{0,1000}\s\-\-SessionEnum\s\-\-Host\s.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 5 |
+
"* --UserEnum --Host *",".{0,1000}\s\-\-UserEnum\s\-\-Host\s.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 6 |
+
"*.exe --ACLScan * --OU *",".{0,1000}\.exe\s\-\-ACLScan\s.{0,1000}\s\-\-OU\s.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 7 |
+
"*.exe --LDAPs --DisableSigning*",".{0,1000}\.exe\s\-\-LDAPs\s\-\-DisableSigning.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 8 |
+
"*/ADCollector.exe*",".{0,1000}\/ADCollector\.exe.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","1","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 9 |
+
"*/ADCollector.git*",".{0,1000}\/ADCollector\.git.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","1","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 10 |
+
"*\ADCollector.exe*",".{0,1000}\\ADCollector\.exe.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 11 |
+
"*\ADCollector3.sln*",".{0,1000}\\ADCollector3\.sln.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 12 |
+
"*\ADCollector3\*",".{0,1000}\\ADCollector3\\.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 13 |
+
"*16e9f3c3f2a4264e3be9d2ddfe8d4ad409f4db17c077efd372389fbfe89f727b*",".{0,1000}16e9f3c3f2a4264e3be9d2ddfe8d4ad409f4db17c077efd372389fbfe89f727b.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","#filehash","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 14 |
+
"*558a73bf1f4a3ecc59133a10d1a7892712f2bd30326f86a12d5c7060274d734d*",".{0,1000}558a73bf1f4a3ecc59133a10d1a7892712f2bd30326f86a12d5c7060274d734d.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","#filehash","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 15 |
+
"*ADCollector3.csproj*",".{0,1000}ADCollector3\.csproj.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 16 |
+
"*D1AE1ACF-8AA2-4935-ACDF-EC22BAE2DF76*",".{0,1000}D1AE1ACF\-8AA2\-4935\-ACDF\-EC22BAE2DF76.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","0","#GUIDproject","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
| 17 |
+
"*dev-2null/ADCollector*",".{0,1000}dev\-2null\/ADCollector.{0,1000}","offensive_tool_keyword","ADCollector","ADCollector is a lightweight tool that enumerates the Active Directory environment","T1087 - T1018 - T1069 - T1482","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/dev-2null/ADCollector","1","1","N/A","N/A","7","7","618","81","2022-07-30T05:27:15Z","2019-05-15T06:42:20Z"
|
ADExplorerSnapshot.py.csv
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*ADExplorerSnapshot.py*",".{0,1000}ADExplorerSnapshot\.py.{0,1000}","offensive_tool_keyword","ADExplorerSnapshot.py","ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound and also supports full-object dumping to NDJSON.","T1087.002 - T1482 - T1083 - T1003.008","TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/c3c/ADExplorerSnapshot.py","1","1","N/A","N/A","10","9","883","119","2024-10-20T07:46:12Z","2021-12-22T14:42:23Z"
|
| 3 |
+
"*ADExplorerSnapshot.py.git*",".{0,1000}ADExplorerSnapshot\.py\.git.{0,1000}","offensive_tool_keyword","ADExplorerSnapshot.py","ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound and also supports full-object dumping to NDJSON.","T1087.002 - T1482 - T1083 - T1003.008","TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/c3c/ADExplorerSnapshot.py","1","1","N/A","N/A","10","9","883","119","2024-10-20T07:46:12Z","2021-12-22T14:42:23Z"
|
| 4 |
+
"*import adexpsnapshot*",".{0,1000}import\sadexpsnapshot.{0,1000}","offensive_tool_keyword","ADExplorerSnapshot.py","ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound and also supports full-object dumping to NDJSON.","T1087.002 - T1482 - T1083 - T1003.008","TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/c3c/ADExplorerSnapshot.py","1","0","N/A","N/A","10","9","883","119","2024-10-20T07:46:12Z","2021-12-22T14:42:23Z"
|
ADFSDump-PS.csv
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/ADFSDump-PS.git*",".{0,1000}\/ADFSDump\-PS\.git.{0,1000}","offensive_tool_keyword","ADFSDump-PS","ADFSDump to assist with GoldenSAML","T1078 - T1552.004 - T1558.004","TA0006 ","N/A","N/A","Credential Access","https://github.com/ZephrFish/ADFSDump-PS","1","1","N/A","N/A","10","1","31","6","2024-05-20T00:00:19Z","2024-05-19T00:46:28Z"
|
| 3 |
+
"*\ADFSDump-PS-main*",".{0,1000}\\ADFSDump\-PS\-main.{0,1000}","offensive_tool_keyword","ADFSDump-PS","ADFSDump to assist with GoldenSAML","T1078 - T1552.004 - T1558.004","TA0006 ","N/A","N/A","Credential Access","https://github.com/ZephrFish/ADFSDump-PS","1","0","N/A","N/A","10","1","31","6","2024-05-20T00:00:19Z","2024-05-19T00:46:28Z"
|
| 4 |
+
"*\Golden.ps1*",".{0,1000}\\Golden\.ps1.{0,1000}","offensive_tool_keyword","ADFSDump-PS","ADFSDump to assist with GoldenSAML","T1078 - T1552.004 - T1558.004","TA0006 ","N/A","N/A","Credential Access","https://github.com/ZephrFish/ADFSDump-PS","1","0","N/A","N/A","10","1","31","6","2024-05-20T00:00:19Z","2024-05-19T00:46:28Z"
|
| 5 |
+
"*c04b117bc1e5883c3c85ab2823071b33dbf1344e581e250fa5d80a8fae6b338b*",".{0,1000}c04b117bc1e5883c3c85ab2823071b33dbf1344e581e250fa5d80a8fae6b338b.{0,1000}","offensive_tool_keyword","ADFSDump-PS","ADFSDump to assist with GoldenSAML","T1078 - T1552.004 - T1558.004","TA0006 ","N/A","N/A","Credential Access","https://github.com/ZephrFish/ADFSDump-PS","1","0","#filehash","N/A","10","1","31","6","2024-05-20T00:00:19Z","2024-05-19T00:46:28Z"
|
| 6 |
+
"*ZephrFish/ADFSDump-PS*",".{0,1000}ZephrFish\/ADFSDump\-PS.{0,1000}","offensive_tool_keyword","ADFSDump-PS","ADFSDump to assist with GoldenSAML","T1078 - T1552.004 - T1558.004","TA0006 ","N/A","N/A","Credential Access","https://github.com/ZephrFish/ADFSDump-PS","1","1","N/A","N/A","10","1","31","6","2024-05-20T00:00:19Z","2024-05-19T00:46:28Z"
|
ADFSDump.csv
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*!!! Are you sure you are running as the AD FS service account?*",".{0,1000}!!!\sAre\syou\ssure\syou\sare\srunning\sas\sthe\sAD\sFS\sservice\saccount\?.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 3 |
+
"*## Extracting Private Key from Active Directory Store*",".{0,1000}\#\#\sExtracting\sPrivate\sKey\sfrom\sActive\sDirectory\sStore.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 4 |
+
"*/ADFSDump.git*",".{0,1000}\/ADFSDump\.git.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","1","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 5 |
+
"*\ADFSDump.*",".{0,1000}\\ADFSDump\..{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 6 |
+
"*\ADFSDump\*",".{0,1000}\\ADFSDump\\.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 7 |
+
"*\ADFSDump\*",".{0,1000}\\ADFSDump\\.{0,1000}","offensive_tool_keyword","ADFSDump","executables for penetration testing Windows Active Directory environments","T1016 - T1046 - T1087 - T1082 - T1055 - T1068 - T1083 - T1012 - T1558 - T1097 - T1077 - T1134 - T1550 - T1078 - T1021 - T1072 - T1484 - T1553 - T1557 - T1003 - T1555 - T1134 - T1055 - T1088","TA0007 - TA0008 - TA0004 - TA0006 - TA0002 - TA0005","N/A","N/A","Exploitation tool","https://github.com/jakobfriedl/precompiled-binaries","1","0","N/A","ADFSDump","10","1","86","23","2024-09-16T11:29:31Z","2023-08-08T12:21:46Z"
|
| 8 |
+
"*\ADFSDump-master*",".{0,1000}\\ADFSDump\-master.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 9 |
+
"*>ADFSDump<*",".{0,1000}\>ADFSDump\<.{0,1000}","offensive_tool_keyword","ADFSDump","executables for penetration testing Windows Active Directory environments","T1016 - T1046 - T1087 - T1082 - T1055 - T1068 - T1083 - T1012 - T1558 - T1097 - T1077 - T1134 - T1550 - T1078 - T1021 - T1072 - T1484 - T1553 - T1557 - T1003 - T1555 - T1134 - T1055 - T1088","TA0007 - TA0008 - TA0004 - TA0006 - TA0002 - TA0005","N/A","N/A","Exploitation tool","https://github.com/jakobfriedl/precompiled-binaries","1","0","#productname","ADFSDump","10","1","86","23","2024-09-16T11:29:31Z","2023-08-08T12:21:46Z"
|
| 10 |
+
"*46d1f15077f064a99b06bb115ba498581828ff8b712b2c41f6eb602538077035*",".{0,1000}46d1f15077f064a99b06bb115ba498581828ff8b712b2c41f6eb602538077035.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","#filehash","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 11 |
+
"*7aa369f9365c35abe1cfea6a209a8a6071d7af3377a357f94721860c02e4d332*",".{0,1000}7aa369f9365c35abe1cfea6a209a8a6071d7af3377a357f94721860c02e4d332.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","#filehash","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 12 |
+
"*9EE27D63-6AC9-4037-860B-44E91BAE7F0D*",".{0,1000}9EE27D63\-6AC9\-4037\-860B\-44E91BAE7F0D.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","0","#GUIDproject","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 13 |
+
"*ADFSDump.csproj*",".{0,1000}ADFSDump\.csproj.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","1","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 14 |
+
"*ADFSDump.exe*",".{0,1000}ADFSDump\.exe.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","1","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 15 |
+
"*ADFSDump.exe*",".{0,1000}ADFSDump\.exe.{0,1000}","offensive_tool_keyword","ADFSDump","executables for penetration testing Windows Active Directory environments","T1016 - T1046 - T1087 - T1082 - T1055 - T1068 - T1083 - T1012 - T1558 - T1097 - T1077 - T1134 - T1550 - T1078 - T1021 - T1072 - T1484 - T1553 - T1557 - T1003 - T1555 - T1134 - T1055 - T1088","TA0007 - TA0008 - TA0004 - TA0006 - TA0002 - TA0005","N/A","N/A","Exploitation tool","https://github.com/jakobfriedl/precompiled-binaries","1","1","N/A","ADFSDump","10","1","86","23","2024-09-16T11:29:31Z","2023-08-08T12:21:46Z"
|
| 16 |
+
"*ADFSDump.sln*",".{0,1000}ADFSDump\.sln.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","1","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
| 17 |
+
"*mandiant/ADFSDump*",".{0,1000}mandiant\/ADFSDump.{0,1000}","offensive_tool_keyword","ADFSDump","A C# tool to dump all sorts of goodies from AD FS","T1081 - T1003 - T1114 - T1212","TA0006 - TA0005 - TA0009","N/A","N/A","Credential Access","https://github.com/mandiant/ADFSDump","1","1","N/A","N/A","10","4","310","66","2023-08-07T16:58:37Z","2019-03-20T22:31:16Z"
|
ADFSRelay.csv
ADDED
|
@@ -0,0 +1,12 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* | NTLMParse*",".{0,1000}\s\|\sNTLMParse.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","0","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 3 |
+
"*/ADFSRelay.git*",".{0,1000}\/ADFSRelay\.git.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","1","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 4 |
+
"*/ADFSRelay.go*",".{0,1000}\/ADFSRelay\.go.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","1","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 5 |
+
"*/NTLMParse.go*",".{0,1000}\/NTLMParse\.go.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","1","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 6 |
+
"*/releases/download/v1.0/ADFSRelay*",".{0,1000}\/releases\/download\/v1\.0\/ADFSRelay.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","1","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 7 |
+
"*/releases/download/v1.0/NTLMParse*",".{0,1000}\/releases\/download\/v1\.0\/NTLMParse.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","1","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 8 |
+
"*\ADFSRelay\*",".{0,1000}\\ADFSRelay\\.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","0","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 9 |
+
"*ADFSRelay -*",".{0,1000}ADFSRelay\s\-.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","0","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 10 |
+
"*ADFSRelay-main*",".{0,1000}ADFSRelay\-main.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","0","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 11 |
+
"*praetorian.com/blog/relaying-to-adfs-attacks/*",".{0,1000}praetorian\.com\/blog\/relaying\-to\-adfs\-attacks\/.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","1","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
| 12 |
+
"*praetorian-inc/ADFSRelay*",".{0,1000}praetorian\-inc\/ADFSRelay.{0,1000}","offensive_tool_keyword","ADFSRelay","NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages is helpful when researching the behavior of a particular NTLM implementation. ADFSRelay is a proof of concept utility developed while researching the feasibility of NTLM relaying attacks targeting the ADFS service. This utility can be leveraged to perform NTLM relaying attacks targeting ADFS","T1140 - T1212 - T1557","TA0007 - TA0008 - TA0006","N/A","N/A","Credential Access","https://github.com/praetorian-inc/ADFSRelay","1","1","N/A","N/A","10","2","171","14","2022-06-22T03:01:00Z","2022-05-12T01:20:14Z"
|
ADFSpoof.csv
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* ADFSpoof.py*",".{0,1000}\sADFSpoof\.py.{0,1000}","offensive_tool_keyword","ADFSpoof","A python tool to forge AD FS security tokens.","T1550.004 - T1071 - T1606","TA0006 - TA0011 - TA0008","N/A","N/A","Sniffing & Spoofing","https://github.com/mandiant/ADFSpoof","1","0","N/A","N/A","10","4","351","61","2024-08-12T08:13:42Z","2019-03-20T22:30:58Z"
|
| 3 |
+
"* -b *.bin *.bin dump*",".{0,1000}\s\-b\s.{0,1000}\.bin\s.{0,1000}\.bin\sdump.{0,1000}","offensive_tool_keyword","ADFSpoof","A python tool to forge AD FS security tokens.","T1550.004 - T1071 - T1606","TA0006 - TA0011 - TA0008","N/A","N/A","Sniffing & Spoofing","https://github.com/mandiant/ADFSpoof","1","0","N/A","N/A","10","4","351","61","2024-08-12T08:13:42Z","2019-03-20T22:30:58Z"
|
| 4 |
+
"*/ADFSpoof.py*",".{0,1000}\/ADFSpoof\.py.{0,1000}","offensive_tool_keyword","ADFSpoof","A python tool to forge AD FS security tokens.","T1550.004 - T1071 - T1606","TA0006 - TA0011 - TA0008","N/A","N/A","Sniffing & Spoofing","https://github.com/mandiant/ADFSpoof","1","1","N/A","N/A","10","4","351","61","2024-08-12T08:13:42Z","2019-03-20T22:30:58Z"
|
| 5 |
+
"*\ADFSpoof.py*",".{0,1000}\\ADFSpoof\.py.{0,1000}","offensive_tool_keyword","ADFSpoof","A python tool to forge AD FS security tokens.","T1550.004 - T1071 - T1606","TA0006 - TA0011 - TA0008","N/A","N/A","Sniffing & Spoofing","https://github.com/mandiant/ADFSpoof","1","0","N/A","N/A","10","4","351","61","2024-08-12T08:13:42Z","2019-03-20T22:30:58Z"
|
| 6 |
+
"*ADFSpoof-master*",".{0,1000}ADFSpoof\-master.{0,1000}","offensive_tool_keyword","ADFSpoof","A python tool to forge AD FS security tokens.","T1550.004 - T1071 - T1606","TA0006 - TA0011 - TA0008","N/A","N/A","Sniffing & Spoofing","https://github.com/mandiant/ADFSpoof","1","1","N/A","N/A","10","4","351","61","2024-08-12T08:13:42Z","2019-03-20T22:30:58Z"
|
| 7 |
+
"*EncryptedPfx.py*",".{0,1000}EncryptedPfx\.py.{0,1000}","offensive_tool_keyword","ADFSpoof","A python tool to forge AD FS security tokens.","T1550.004 - T1071 - T1606","TA0006 - TA0011 - TA0008","N/A","N/A","Sniffing & Spoofing","https://github.com/mandiant/ADFSpoof","1","0","N/A","N/A","10","4","351","61","2024-08-12T08:13:42Z","2019-03-20T22:30:58Z"
|
ADPassHunt.csv
ADDED
|
@@ -0,0 +1,16 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* ADPassHunt.GetGPPPassword*",".{0,1000}\sADPassHunt\.GetGPPPassword.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 3 |
+
"*[ADA] Searching for accounts with msSFU30Password attribute*",".{0,1000}\[ADA\]\sSearching\sfor\saccounts\swith\smsSFU30Password\sattribute.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 4 |
+
"*[ADA] Searching for accounts with userpassword attribute*",".{0,1000}\[ADA\]\sSearching\sfor\saccounts\swith\suserpassword\sattribute.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 5 |
+
"*[GPP] Searching for passwords now*",".{0,1000}\[GPP\]\sSearching\sfor\spasswords\snow.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 6 |
+
"*\ADPassHunt.pdb*",".{0,1000}\\ADPassHunt\.pdb.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 7 |
+
"*\ADPassHunt\*",".{0,1000}\\ADPassHunt\\.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 8 |
+
"*>ADPassHunt<*",".{0,1000}\>ADPassHunt\<.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","#productname","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 9 |
+
"*73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f*",".{0,1000}73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","#filehash","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 10 |
+
"*AdPassHunt (PUA)*",".{0,1000}AdPassHunt\s\(PUA\).{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","#Avsignature","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 11 |
+
"*ADPassHunt.exe*",".{0,1000}ADPassHunt\.exe.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","1","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 12 |
+
"*Get-GPPAutologons*",".{0,1000}Get\-GPPAutologons.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 13 |
+
"*Get-GPPPasswords*",".{0,1000}Get\-GPPPasswords.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","N/A","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 14 |
+
"*HackTool:Win32/PWDump*",".{0,1000}HackTool\:Win32\/PWDump.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","#Avsignature","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 15 |
+
"*HackTool:Win32/PWDump*",".{0,1000}HackTool\:Win32\/PWDump.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","#Avsignature","N/A","10","10","N/A","N/A","N/A","N/A"
|
| 16 |
+
"*Win.Tool.ADPassHunt-*",".{0,1000}Win\.Tool\.ADPassHunt\-.{0,1000}","offensive_tool_keyword","ADPassHunt","credential stealer tool that hunts Active Directory credentials (leaked tool Developed In-house for Fireeyes Red Team)","T1003.003 - T1552.006","TA0006 - TA0007","N/A","N/A","Credential Access","https://www.virustotal.com/gui/file/73233ca7230fb5848e220723caa06d795a14c0f1f42c6a59482e812bfb8c217f","1","0","#Avsignature","N/A","10","10","N/A","N/A","N/A","N/A"
|
ADSyncDecrypt.csv
ADDED
|
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*\ADSyncDecrypt\*",".{0,1000}\\ADSyncDecrypt\\.{0,1000}","offensive_tool_keyword","ADSyncDecrypt","executables for penetration testing Windows Active Directory environments","T1016 - T1046 - T1087 - T1082 - T1055 - T1068 - T1083 - T1012 - T1558 - T1097 - T1077 - T1134 - T1550 - T1078 - T1021 - T1072 - T1484 - T1553 - T1557 - T1003 - T1555 - T1134 - T1055 - T1088","TA0007 - TA0008 - TA0004 - TA0006 - TA0002 - TA0005","N/A","N/A","Exploitation tool","https://github.com/jakobfriedl/precompiled-binaries","1","0","N/A","ADSyncDecrypt","10","1","86","23","2024-09-16T11:29:31Z","2023-08-08T12:21:46Z"
|
| 3 |
+
"*>ADSyncDecrypt<*",".{0,1000}\>ADSyncDecrypt\<.{0,1000}","offensive_tool_keyword","ADSyncDecrypt","executables for penetration testing Windows Active Directory environments","T1016 - T1046 - T1087 - T1082 - T1055 - T1068 - T1083 - T1012 - T1558 - T1097 - T1077 - T1134 - T1550 - T1078 - T1021 - T1072 - T1484 - T1553 - T1557 - T1003 - T1555 - T1134 - T1055 - T1088","TA0007 - TA0008 - TA0004 - TA0006 - TA0002 - TA0005","N/A","N/A","Exploitation tool","https://github.com/jakobfriedl/precompiled-binaries","1","0","#productname","ADSyncDecrypt","10","1","86","23","2024-09-16T11:29:31Z","2023-08-08T12:21:46Z"
|
| 4 |
+
"*ADSyncDecrypt.exe*",".{0,1000}ADSyncDecrypt\.exe.{0,1000}","offensive_tool_keyword","ADSyncDecrypt","executables for penetration testing Windows Active Directory environments","T1016 - T1046 - T1087 - T1082 - T1055 - T1068 - T1083 - T1012 - T1558 - T1097 - T1077 - T1134 - T1550 - T1078 - T1021 - T1072 - T1484 - T1553 - T1557 - T1003 - T1555 - T1134 - T1055 - T1088","TA0007 - TA0008 - TA0004 - TA0006 - TA0002 - TA0005","N/A","N/A","Exploitation tool","https://github.com/jakobfriedl/precompiled-binaries","1","1","N/A","ADSyncDecrypt","10","1","86","23","2024-09-16T11:29:31Z","2023-08-08T12:21:46Z"
|
| 5 |
+
"*aHR0cHM6Ly9hcGkuZ2l0aHViLmNvbS9yZXBvcy9nZW50aWxraXdpL21pbWlrYXR6L3JlbGVhc2VzL2xhdGVzdA==*",".{0,1000}aHR0cHM6Ly9hcGkuZ2l0aHViLmNvbS9yZXBvcy9nZW50aWxraXdpL21pbWlrYXR6L3JlbGVhc2VzL2xhdGVzdA\=\=.{0,1000}","offensive_tool_keyword","ADSyncDecrypt","executables for penetration testing Windows Active Directory environments","T1016 - T1046 - T1087 - T1082 - T1055 - T1068 - T1083 - T1012 - T1558 - T1097 - T1077 - T1134 - T1550 - T1078 - T1021 - T1072 - T1484 - T1553 - T1557 - T1003 - T1555 - T1134 - T1055 - T1088","TA0007 - TA0008 - TA0004 - TA0006 - TA0002 - TA0005","N/A","N/A","Exploitation tool","https://github.com/jakobfriedl/precompiled-binaries","1","0","#base64","ADSyncDecrypt","10","1","86","23","2024-09-16T11:29:31Z","2023-08-08T12:21:46Z"
|
AD_Enumeration_Hunt.csv
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AD_Enumeration_Hunt*",".{0,1000}\/AD_Enumeration_Hunt.{0,1000}","offensive_tool_keyword","AD_Enumeration_Hunt","This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment","T1018 - T1003 - T1033 - T1087 - T1069 - T1046 - T1069.002 - T1047 - T1083","TA0001 - TA0007 - TA0005 - TA0002 - TA0003","N/A","N/A","Discovery","https://github.com/alperenugurlu/AD_Enumeration_Hunt","1","1","N/A","AD Enumeration","7","1","92","20","2023-08-05T06:10:26Z","2023-08-05T05:16:57Z"
|
| 3 |
+
"*AD_Enumeration_Hunt.ps1*",".{0,1000}AD_Enumeration_Hunt\.ps1.{0,1000}","offensive_tool_keyword","AD_Enumeration_Hunt","This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment","T1018 - T1003 - T1033 - T1087 - T1069 - T1046 - T1069.002 - T1047 - T1083","TA0001 - TA0007 - TA0005 - TA0002 - TA0003","N/A","N/A","Discovery","https://github.com/alperenugurlu/AD_Enumeration_Hunt","1","1","N/A","AD Enumeration","7","1","92","20","2023-08-05T06:10:26Z","2023-08-05T05:16:57Z"
|
| 4 |
+
"*AD_Enumeration_Hunt-alperen_ugurlu_hack*",".{0,1000}AD_Enumeration_Hunt\-alperen_ugurlu_hack.{0,1000}","offensive_tool_keyword","AD_Enumeration_Hunt","This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment","T1018 - T1003 - T1033 - T1087 - T1069 - T1046 - T1069.002 - T1047 - T1083","TA0001 - TA0007 - TA0005 - TA0002 - TA0003","N/A","N/A","Discovery","https://github.com/alperenugurlu/AD_Enumeration_Hunt","1","1","N/A","AD Enumeration","7","1","92","20","2023-08-05T06:10:26Z","2023-08-05T05:16:57Z"
|
AD_Miner.csv
ADDED
|
@@ -0,0 +1,55 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AD_Miner.git*",".{0,1000}\/AD_Miner\.git.{0,1000}","offensive_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1087.002 - T1069 - T1018 - T1595","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","1","N/A","AD Enumeration","7","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 3 |
+
"*/AD_Miner.git*",".{0,1000}\/AD_Miner\.git.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","1","N/A","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 4 |
+
"*/AD_Miner/releases/*",".{0,1000}\/AD_Miner\/releases\/.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","1","N/A","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 5 |
+
"*\AD_Miner-*",".{0,1000}\\AD_Miner\-.{0,1000}","offensive_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1087.002 - T1069 - T1018 - T1595","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","N/A","AD Enumeration","7","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 6 |
+
"*006d97f8510e34966ebd1901686cf407a57663ad42374e40c023c6611595d1e3*",".{0,1000}006d97f8510e34966ebd1901686cf407a57663ad42374e40c023c6611595d1e3.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 7 |
+
"*03adcafddad36073108832b0c7541b0f398c074c42693a0fa847f8d7f789cd7e*",".{0,1000}03adcafddad36073108832b0c7541b0f398c074c42693a0fa847f8d7f789cd7e.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 8 |
+
"*182d8cd3ed748f2fd1e1d5195eb56e6b4c12cd27241f47ccb965cd657bcf4c07*",".{0,1000}182d8cd3ed748f2fd1e1d5195eb56e6b4c12cd27241f47ccb965cd657bcf4c07.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 9 |
+
"*1853adeeee45b385f71719b52c95f1c84c040d70296157d2ee52bd040aff39cd*",".{0,1000}1853adeeee45b385f71719b52c95f1c84c040d70296157d2ee52bd040aff39cd.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 10 |
+
"*1df2598fa2ca5e42fc9e4d4d0cf1e67ed61ab2b9ff29b9da372cee03d817ad2b*",".{0,1000}1df2598fa2ca5e42fc9e4d4d0cf1e67ed61ab2b9ff29b9da372cee03d817ad2b.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 11 |
+
"*23d1a218ea1aa584c37006037a152e7d51ddb7e4328cba41eddf9ce40240b5de*",".{0,1000}23d1a218ea1aa584c37006037a152e7d51ddb7e4328cba41eddf9ce40240b5de.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 12 |
+
"*29cacc6ed6f7bfe7412947ead514e4081c7a71bb22e4c959a9c233cec9e54a27*",".{0,1000}29cacc6ed6f7bfe7412947ead514e4081c7a71bb22e4c959a9c233cec9e54a27.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 13 |
+
"*2e7a9e27d26187a0ee5fd4a47c785fcd5b1daaf4a076ad4e156a0827d1f6df4f*",".{0,1000}2e7a9e27d26187a0ee5fd4a47c785fcd5b1daaf4a076ad4e156a0827d1f6df4f.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 14 |
+
"*306a981bc54a0720a927f9c10f35db8f8c884d923d2c516f022ca6a7b0950836*",".{0,1000}306a981bc54a0720a927f9c10f35db8f8c884d923d2c516f022ca6a7b0950836.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 15 |
+
"*34848aab797df134ed0268cbc77a7db060f63e0ccba71062c9e6b1512e6b6993*",".{0,1000}34848aab797df134ed0268cbc77a7db060f63e0ccba71062c9e6b1512e6b6993.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 16 |
+
"*38cd3309626aa2310571aa17637b72281c54aa873a2782dcc7c5f7cdb20c8985*",".{0,1000}38cd3309626aa2310571aa17637b72281c54aa873a2782dcc7c5f7cdb20c8985.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 17 |
+
"*47a5be9f74f89fe03ee5f7db50e5efaf858629e992cfc78c99562bcd888753f2*",".{0,1000}47a5be9f74f89fe03ee5f7db50e5efaf858629e992cfc78c99562bcd888753f2.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 18 |
+
"*4a144263cc2ecadea15182ecfca96ab398f5a1c8ee7b2f6ce6cb35b595ec9e9c*",".{0,1000}4a144263cc2ecadea15182ecfca96ab398f5a1c8ee7b2f6ce6cb35b595ec9e9c.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 19 |
+
"*4b01df48ff3611b58680b8671c5371fed09b18333fe608187470666cb5c906ce*",".{0,1000}4b01df48ff3611b58680b8671c5371fed09b18333fe608187470666cb5c906ce.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 20 |
+
"*540199cba6c77f452c01d554ca2e9d5e1203896f81695182f76e703595d2ed0a*",".{0,1000}540199cba6c77f452c01d554ca2e9d5e1203896f81695182f76e703595d2ed0a.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 21 |
+
"*54093af487e6bfbe0ac27b0470a11ff5144130b3340bd5ade5c307cd9a2d2456*",".{0,1000}54093af487e6bfbe0ac27b0470a11ff5144130b3340bd5ade5c307cd9a2d2456.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 22 |
+
"*589472bbf12e3f53c7cf3447a6b280dd9931600441c8251472c01b3ff5b36c8f*",".{0,1000}589472bbf12e3f53c7cf3447a6b280dd9931600441c8251472c01b3ff5b36c8f.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 23 |
+
"*5ea16e19f72ef48bae23711ec666f2bc8e791ff51e3abf6158afb4f5997ceb0e*",".{0,1000}5ea16e19f72ef48bae23711ec666f2bc8e791ff51e3abf6158afb4f5997ceb0e.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 24 |
+
"*6a5ef3f47ea5813d221d0b2742ba2dd7c05c4ad02fec93fe93ec91a030e643fc*",".{0,1000}6a5ef3f47ea5813d221d0b2742ba2dd7c05c4ad02fec93fe93ec91a030e643fc.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 25 |
+
"*6f3b17759a79f9cee899d61622d88b6a5f87aa7d8ecdc8c4d82fd0386c3e8c0a*",".{0,1000}6f3b17759a79f9cee899d61622d88b6a5f87aa7d8ecdc8c4d82fd0386c3e8c0a.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 26 |
+
"*73d07981ab0538707f5045dc72a89ff0c7dd2a4c403950cc77ee13c8ca6c65b4*",".{0,1000}73d07981ab0538707f5045dc72a89ff0c7dd2a4c403950cc77ee13c8ca6c65b4.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 27 |
+
"*7b0e1417692e9ea1fe147c7e1f63461219c66a571affd8b807d655bf145090f1*",".{0,1000}7b0e1417692e9ea1fe147c7e1f63461219c66a571affd8b807d655bf145090f1.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 28 |
+
"*8c44028d1edb931e5561198ca64cfe1e078097ba236fd6ed14e553d9ff114f00*",".{0,1000}8c44028d1edb931e5561198ca64cfe1e078097ba236fd6ed14e553d9ff114f00.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 29 |
+
"*8d551e03684d6dad75e286f8f0c06a7d0e7e2c6a0830c2b3986301fb380639a2*",".{0,1000}8d551e03684d6dad75e286f8f0c06a7d0e7e2c6a0830c2b3986301fb380639a2.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 30 |
+
"*9b4d79ab99acc97ca17ba9125218aac2374e37fdf071edd871294f2a493e68d9*",".{0,1000}9b4d79ab99acc97ca17ba9125218aac2374e37fdf071edd871294f2a493e68d9.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 31 |
+
"*a0005f263f682b7623cf12d1ca7d47d3c4108591019131e413a49566c7458081*",".{0,1000}a0005f263f682b7623cf12d1ca7d47d3c4108591019131e413a49566c7458081.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 32 |
+
"*a37163c7c31a96ed6d72fb1b9e792ca8245c2bea5504fa87178fda29f00a0e6f*",".{0,1000}a37163c7c31a96ed6d72fb1b9e792ca8245c2bea5504fa87178fda29f00a0e6f.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 33 |
+
"*a5fa4d3e02ec0196dd34d81d21118e6bf4014405cefd9a8e99b3fec15d4bf057*",".{0,1000}a5fa4d3e02ec0196dd34d81d21118e6bf4014405cefd9a8e99b3fec15d4bf057.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 34 |
+
"*a8dc7da67b4c6211d0486ba8b5bed5a0fdf894109f8861acf43db8a1e87e5d74*",".{0,1000}a8dc7da67b4c6211d0486ba8b5bed5a0fdf894109f8861acf43db8a1e87e5d74.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 35 |
+
"*a974d7a0717319394a473b04e6c227cf30158140fe2546ca9210acbaa1630518*",".{0,1000}a974d7a0717319394a473b04e6c227cf30158140fe2546ca9210acbaa1630518.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 36 |
+
"*ad_miner.sources.modules.*",".{0,1000}ad_miner\.sources\.modules\..{0,1000}","offensive_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1087.002 - T1069 - T1018 - T1595","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","N/A","AD Enumeration","7","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 37 |
+
"*AD_Miner-main*",".{0,1000}AD_Miner\-main.{0,1000}","offensive_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1087.002 - T1069 - T1018 - T1595","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","1","N/A","AD Enumeration","7","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 38 |
+
"*AD-miner -*",".{0,1000}AD\-miner\s\-.{0,1000}","offensive_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1087.002 - T1069 - T1018 - T1595","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","N/A","AD Enumeration","7","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 39 |
+
"*aed35b08d85842b94df3b093cbb2ed6dc8d240567275b7880ddb93da9f097154*",".{0,1000}aed35b08d85842b94df3b093cbb2ed6dc8d240567275b7880ddb93da9f097154.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 40 |
+
"*bb651a2795e62aee6efd88e889c2c7f553f4df16e59562182b5565d34d1e6970*",".{0,1000}bb651a2795e62aee6efd88e889c2c7f553f4df16e59562182b5565d34d1e6970.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 41 |
+
"*be57fdfea2475688c89f91967e17371265f6803b3edfba4026befd6272c86e71*",".{0,1000}be57fdfea2475688c89f91967e17371265f6803b3edfba4026befd6272c86e71.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 42 |
+
"*bf9c44a258f8494cd015d4211896068c38fdaec54ab1e0f84295a78482a070c8*",".{0,1000}bf9c44a258f8494cd015d4211896068c38fdaec54ab1e0f84295a78482a070c8.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 43 |
+
"*c491a40347069ca5f75d4c62435fde16c4fec08656fd88f5b502825dfcbc31cf*",".{0,1000}c491a40347069ca5f75d4c62435fde16c4fec08656fd88f5b502825dfcbc31cf.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 44 |
+
"*c91e3e1822b0d7a6c47c27b89753d5f1cbb3bb0759422fc5729d50a1a9eef0f6*",".{0,1000}c91e3e1822b0d7a6c47c27b89753d5f1cbb3bb0759422fc5729d50a1a9eef0f6.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 45 |
+
"*cfde70b05b27b08980827e7120b36d0d6c3b93a079ee5f54a8fd7a1f6e3aa18f*",".{0,1000}cfde70b05b27b08980827e7120b36d0d6c3b93a079ee5f54a8fd7a1f6e3aa18f.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 46 |
+
"*d2c77570cddbb514f155621f4999c4a6b46454b2aee4f5b48a05a89e57f087fa*",".{0,1000}d2c77570cddbb514f155621f4999c4a6b46454b2aee4f5b48a05a89e57f087fa.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 47 |
+
"*e20a5a7af7ee08db7008f0496f29b839d101f3d913410c24ec901273865567c4*",".{0,1000}e20a5a7af7ee08db7008f0496f29b839d101f3d913410c24ec901273865567c4.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 48 |
+
"*e76a240d76ab6e15db2077ea6742538a2cc9471b48467b7b5930831a37a1c140*",".{0,1000}e76a240d76ab6e15db2077ea6742538a2cc9471b48467b7b5930831a37a1c140.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 49 |
+
"*ea03efacd106e0731b520860fd0b6babc8b9bd5300f25e53d66ac833cc867124*",".{0,1000}ea03efacd106e0731b520860fd0b6babc8b9bd5300f25e53d66ac833cc867124.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 50 |
+
"*ef1dd208731a0adf0207f096af478b1be9465d375c60d229be616fd59a2a2dda*",".{0,1000}ef1dd208731a0adf0207f096af478b1be9465d375c60d229be616fd59a2a2dda.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 51 |
+
"*fcb8c6993403e3d29d3bd980eadc0e40984252d0d777236f9d80f4d1e9de9d35*",".{0,1000}fcb8c6993403e3d29d3bd980eadc0e40984252d0d777236f9d80f4d1e9de9d35.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 52 |
+
"*ff94ad03ba7f695b06de1179867e2883d9fab083620e55cbe647b79c093492cb*",".{0,1000}ff94ad03ba7f695b06de1179867e2883d9fab083620e55cbe647b79c093492cb.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","0","#filehash","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 53 |
+
"*https://discord.com/invite/5Hpj4Gs5SS*",".{0,1000}https\:\/\/discord\.com\/invite\/5Hpj4Gs5SS.{0,1000}","offensive_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1087.002 - T1069 - T1018 - T1595","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","1","N/A","AD Enumeration","7","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 54 |
+
"*Mazars-Tech/AD_Miner*",".{0,1000}Mazars\-Tech\/AD_Miner.{0,1000}","offensive_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1087.002 - T1069 - T1018 - T1595","TA0007 - TA0009","N/A","N/A","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","1","N/A","AD Enumeration","7","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
| 55 |
+
"*Mazars-Tech/AD_Miner*",".{0,1000}Mazars\-Tech\/AD_Miner.{0,1000}","greyware_tool_keyword","AD_Miner","AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses","T1482 - T1069 - T1087","TA0007 ","N/A","EMBER BEAR","Discovery","https://github.com/Mazars-Tech/AD_Miner","1","1","N/A","N/A","6","10","1106","114","2024-10-30T09:26:03Z","2023-09-26T12:36:59Z"
|
AMSI-Provider.csv
ADDED
|
@@ -0,0 +1,10 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AMSI-Provider.git*",".{0,1000}\/AMSI\-Provider\.git.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","1","N/A","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 3 |
+
"*\AmsiProvider.cpp*",".{0,1000}\\AmsiProvider\.cpp.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","0","N/A","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 4 |
+
"*\AmsiProvider.sln*",".{0,1000}\\AmsiProvider\.sln.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","0","N/A","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 5 |
+
"*\AMSI-Provider-main*",".{0,1000}\\AMSI\-Provider\-main.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","0","N/A","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 6 |
+
"*58B32FCA-F385-4500-9A8E-7CBA1FC9BA13*",".{0,1000}58B32FCA\-F385\-4500\-9A8E\-7CBA1FC9BA13.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","0","#GUIDproject","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 7 |
+
"*7a9a81c7ef99897281466ea06c14886335cf8d4c835f15aeb1e3a2c7c1d0e760*",".{0,1000}7a9a81c7ef99897281466ea06c14886335cf8d4c835f15aeb1e3a2c7c1d0e760.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","0","#filehash","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 8 |
+
"*90bf7beb921839957e7977851f01e757346d2b4f672e6a08b04e57878cd6efbf*",".{0,1000}90bf7beb921839957e7977851f01e757346d2b4f672e6a08b04e57878cd6efbf.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","0","#filehash","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 9 |
+
"*b4a7045568cb78f48f42b93f528e14ef24f8dc3bf878af0b94ca22c5df546da5*",".{0,1000}b4a7045568cb78f48f42b93f528e14ef24f8dc3bf878af0b94ca22c5df546da5.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","0","#filehash","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
| 10 |
+
"*netbiosX/AMSI-Provider*",".{0,1000}netbiosX\/AMSI\-Provider.{0,1000}","offensive_tool_keyword","AMSI-Provider","A fake AMSI Provider which can be used for persistence","T1546.013 - T1574.012","TA0005 - TA0003","N/A","N/A","Persistence","https://github.com/netbiosX/AMSI-Provider","1","1","N/A","N/A","10","2","139","15","2021-05-16T16:56:15Z","2021-05-15T16:18:47Z"
|
AMSITrigger.csv
ADDED
|
@@ -0,0 +1,20 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AMSITrigger.git*",".{0,1000}\/AMSITrigger\.git.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","1","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 3 |
+
"*\AmsiTrigger.csproj*",".{0,1000}\\AmsiTrigger\.csproj.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 4 |
+
"*\AmsiTrigger.sln*",".{0,1000}\\AmsiTrigger\.sln.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 5 |
+
"*\AMSITrigger\*",".{0,1000}\\AMSITrigger\\.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 6 |
+
"*\AMSITrigger-master*",".{0,1000}\\AMSITrigger\-master.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 7 |
+
"*056a00cd961e5d38f464d6a15393c92f3f0cef668e396f9595822e7147b4c25e*",".{0,1000}056a00cd961e5d38f464d6a15393c92f3f0cef668e396f9595822e7147b4c25e.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 8 |
+
"*0aa6a04c0e8bb0022ccbe0c6f2bf6bc1806c59ffffae3981ae083e49e78573b7*",".{0,1000}0aa6a04c0e8bb0022ccbe0c6f2bf6bc1806c59ffffae3981ae083e49e78573b7.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 9 |
+
"*453c7fcdf6fdf446f846057eb2cd90b495caaf442aa07dbeb9655482809fef43*",".{0,1000}453c7fcdf6fdf446f846057eb2cd90b495caaf442aa07dbeb9655482809fef43.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 10 |
+
"*66c00239681d0f5822544fa18f461864df248a0dc5a76c4a3f981dac5af89162*",".{0,1000}66c00239681d0f5822544fa18f461864df248a0dc5a76c4a3f981dac5af89162.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 11 |
+
"*7864978aad22ff10f75864376b0e57d7ec3ba8bd84e663c2c650f5fc45a9b388*",".{0,1000}7864978aad22ff10f75864376b0e57d7ec3ba8bd84e663c2c650f5fc45a9b388.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 12 |
+
"*8BAAEFF6-1840-4430-AA05-47F2877E3235*",".{0,1000}8BAAEFF6\-1840\-4430\-AA05\-47F2877E3235.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#GUIDproject","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 13 |
+
"*971f7d595c07fa302de6843e85ae22c771bc23a790f4092b5e6cd62fac985ab0*",".{0,1000}971f7d595c07fa302de6843e85ae22c771bc23a790f4092b5e6cd62fac985ab0.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 14 |
+
"*AmsiTrigger.exe*",".{0,1000}AmsiTrigger\.exe.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","1","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 15 |
+
"*AmsiTrigger_x64.exe*",".{0,1000}AmsiTrigger_x64\.exe.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","1","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 16 |
+
"*AmsiTrigger_x86.exe*",".{0,1000}AmsiTrigger_x86\.exe.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","1","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 17 |
+
"*assembly AMSITrigger *",".{0,1000}assembly\sAMSITrigger\s.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 18 |
+
"*ca081dfda125f3b14589e205288777bdc209941e50cebb2298262adcd5c76c86*",".{0,1000}ca081dfda125f3b14589e205288777bdc209941e50cebb2298262adcd5c76c86.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 19 |
+
"*f1bdbea3a5f869e83b52e6284e24d76049a3505492a8b7176cb07f2ad03cbe2b*",".{0,1000}f1bdbea3a5f869e83b52e6284e24d76049a3505492a8b7176cb07f2ad03cbe2b.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","0","#filehash","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
| 20 |
+
"*RythmStick/AMSITrigger*",".{0,1000}RythmStick\/AMSITrigger.{0,1000}","offensive_tool_keyword","AMSITrigger","AMSITrigger will identify all of the malicious strings in a powershell file by repeatedly making calls to AMSI using AMSIScanBuffer - line by line. On receiving an AMSI_RESULT_DETECTED response code the line will then be scrutinised to identify the individual triggers","T1059.001 - T1218.005","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/RythmStick/AMSITrigger","1","1","N/A","https://www.rythmstick.net/posts/amsitrigger/","10","10","1080","153","2022-08-21T22:37:23Z","2020-05-27T09:17:19Z"
|
AMSI_patch.csv
ADDED
|
@@ -0,0 +1,10 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AMSI_patch.git*",".{0,1000}\/AMSI_patch\.git.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 3 |
+
"*/AmsiOpenSession.exe*",".{0,1000}\/AmsiOpenSession\.exe.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 4 |
+
"*AMS1-Patch.exe*",".{0,1000}AMS1\-Patch\.exe.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 5 |
+
"*AMSI_patch-main*",".{0,1000}AMSI_patch\-main.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 6 |
+
"*AmsiOpenSession.cpp*",".{0,1000}AmsiOpenSession\.cpp.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 7 |
+
"*AmsiOpenSession.sln*",".{0,1000}AmsiOpenSession\.sln.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 8 |
+
"*AmsiOpenSession.vcxproj*",".{0,1000}AmsiOpenSession\.vcxproj.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 9 |
+
"*E09F4899-D8B3-4282-9E3A-B20EE9A3D463*",".{0,1000}E09F4899\-D8B3\-4282\-9E3A\-B20EE9A3D463.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","0","#GUIDproject","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
| 10 |
+
"*TheD1rkMtr/AMSI_patch*",".{0,1000}TheD1rkMtr\/AMSI_patch.{0,1000}","offensive_tool_keyword","AMSI_patch","Patching AmsiOpenSession by forcing an error branching","T1055 - T1055.001 - T1112","TA0005","N/A","N/A","Defense Evasion","https://github.com/TheD1rkMtr/AMSI_patch","1","1","N/A","N/A","8","2","143","28","2023-08-02T02:27:00Z","2023-02-03T18:11:37Z"
|
APCLdr.csv
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/APCLdr.*",".{0,1000}\/APCLdr\..{0,1000}","offensive_tool_keyword","APCLdr","APCLdr: Payload Loader With Evasion Features","T1027 - T1055 - T1055.002 - T1055.003 - T1070 - T1070.004 - T1071 - T1106 - T1574.001","TA0005 - TA0006 - TA0008","N/A","N/A","Defense Evasion","https://github.com/NUL0x4C/APCLdr","1","1","N/A","N/A","N/A","4","306","52","2023-01-22T04:24:33Z","2023-01-21T18:09:36Z"
|
| 3 |
+
"*\APCLdr.*",".{0,1000}\\APCLdr\..{0,1000}","offensive_tool_keyword","APCLdr","APCLdr: Payload Loader With Evasion Features","T1027 - T1055 - T1055.002 - T1055.003 - T1070 - T1070.004 - T1071 - T1106 - T1574.001","TA0005 - TA0006 - TA0008","N/A","N/A","Defense Evasion","https://github.com/NUL0x4C/APCLdr","1","1","N/A","N/A","N/A","4","306","52","2023-01-22T04:24:33Z","2023-01-21T18:09:36Z"
|
| 4 |
+
"*NUL0x4C/APCLdr*",".{0,1000}NUL0x4C\/APCLdr.{0,1000}","offensive_tool_keyword","APCLdr","APCLdr: Payload Loader With Evasion Features","T1027 - T1055 - T1055.002 - T1055.003 - T1070 - T1070.004 - T1071 - T1106 - T1574.001","TA0005 - TA0006 - TA0008","N/A","N/A","Defense Evasion","https://github.com/NUL0x4C/APCLdr","1","1","N/A","N/A","N/A","4","306","52","2023-01-22T04:24:33Z","2023-01-21T18:09:36Z"
|
APT.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*APT::Update::Pre-Invoke *}*",".{0,1000}APT\:\:Update\:\:Pre\-Invoke\s.{0,1000}\}.{0,1000}","greyware_tool_keyword","APT","linux commands abused by attackers - backdoor apt execute a command when invoking apt","T1059.003 - T1053.005 - T1105 - T1012 - T1057 - T1083 - T1041 - T1036 - T1035 - T1562.001 - T1564.001 - T1564.005 - T1564.002 - T1564.003 - T1027 - T1070.001 - T1112 - T1136","TA0003 - TA0007 - TA0008 - TA0010 - TA0006 - TA0002","N/A","N/A","Exploitation tool","N/A","1","0","N/A","greyware_tools high risks of false positives","N/A","N/A","N/A","N/A","N/A","N/A"
|
APTSimulator.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*APTSimulator*",".{0,1000}APTSimulator.{0,1000}","offensive_tool_keyword","APTSimulator","APT Simulator is a Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised. In contrast to other adversary simulation tools. APT Simulator is deisgned to make the application as simple as possible. You don't need to run a web server. database or any agents on set of virtual machines. Just download the prepared archive. extract and run the contained Batch file as Administrator. Running APT Simulator takes less than a minute of your time.","T1036 - T1059 - T1562 - T1027 - T1003","TA0001 - TA0008 - TA0002","N/A","N/A","Exploitation tool","https://github.com/NextronSystems/APTSimulator","1","1","N/A","N/A","N/A","10","2462","427","2023-06-16T08:48:25Z","2018-02-03T14:19:42Z"
|
ASPJinjaObfuscator.csv
ADDED
|
@@ -0,0 +1,10 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*# Add random newlines to the obfuscated code*",".{0,1000}\#\sAdd\srandom\snewlines\sto\sthe\sobfuscated\scode.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","0","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 3 |
+
"*/ASPJinjaObfuscator.git*",".{0,1000}\/ASPJinjaObfuscator\.git.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","1","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 4 |
+
"*\ASPJinjaObfuscator*",".{0,1000}\\ASPJinjaObfuscator.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","0","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 5 |
+
"*09855e8685bbec09962affefbfad2c554d434a87aca1e1ac8c961f5ebfe6cdad*",".{0,1000}09855e8685bbec09962affefbfad2c554d434a87aca1e1ac8c961f5ebfe6cdad.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","0","#filehash","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 6 |
+
"*add_random_newlines(obfuscated_code*",".{0,1000}add_random_newlines\(obfuscated_code.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","0","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 7 |
+
"*asp-jinja-obfuscator.py*",".{0,1000}asp\-jinja\-obfuscator\.py.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","1","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 8 |
+
"*encode_base64(xor_encrypt(""cmd /c *",".{0,1000}encode_base64\(xor_encrypt\(\""cmd\s\/c\s.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","0","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 9 |
+
"*encode_base64(xor_encrypt(""WScript.Shell""*",".{0,1000}encode_base64\(xor_encrypt\(\""WScript\.Shell\"".{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","0","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
| 10 |
+
"*fin3ss3g0d/ASPJinjaObfuscator*",".{0,1000}fin3ss3g0d\/ASPJinjaObfuscator.{0,1000}","offensive_tool_keyword","ASPJinjaObfuscator","Heavily obfuscated ASP web shell generation tool.","T1100 - T1027","TA0003 - TA0005","N/A","N/A","Defense Evasion","https://github.com/fin3ss3g0d/ASPJinjaObfuscator","1","1","N/A","N/A","8","2","161","21","2024-04-26T01:27:42Z","2024-04-23T01:01:53Z"
|
ASREPRoast.csv
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/ASREPRoast*",".{0,1000}\/ASREPRoast.{0,1000}","offensive_tool_keyword","ASREPRoast","Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled. ","T1558.003","TA0006","N/A","N/A","Credential Access","https://github.com/HarmJ0y/ASREPRoast","1","1","N/A","N/A","N/A","2","197","58","2018-09-25T03:26:00Z","2017-01-14T21:07:57Z"
|
| 3 |
+
"*ASREPRoast.ps1*",".{0,1000}ASREPRoast\.ps1.{0,1000}","offensive_tool_keyword","ASREPRoast","Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled. ","T1558.003","TA0006","N/A","N/A","Credential Access","https://github.com/HarmJ0y/ASREPRoast","1","1","N/A","N/A","N/A","2","197","58","2018-09-25T03:26:00Z","2017-01-14T21:07:57Z"
|
| 4 |
+
"*crackTGS*",".{0,1000}crackTGS.{0,1000}","offensive_tool_keyword","ASREPRoast","Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled. ","T1558.003","TA0006","N/A","N/A","Credential Access","https://github.com/HarmJ0y/ASREPRoast","1","0","N/A","N/A","N/A","2","197","58","2018-09-25T03:26:00Z","2017-01-14T21:07:57Z"
|
| 5 |
+
"*Invoke-ASREPRoast*",".{0,1000}Invoke\-ASREPRoast.{0,1000}","offensive_tool_keyword","ASREPRoast","Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled. ","T1558.003","TA0006","N/A","N/A","Credential Access","https://github.com/HarmJ0y/ASREPRoast","1","1","N/A","N/A","N/A","2","197","58","2018-09-25T03:26:00Z","2017-01-14T21:07:57Z"
|
| 6 |
+
"*tgscrack.go*",".{0,1000}tgscrack\.go.{0,1000}","offensive_tool_keyword","ASREPRoast","Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled. ","T1558.003","TA0006","N/A","N/A","Credential Access","https://github.com/HarmJ0y/ASREPRoast","1","1","N/A","N/A","N/A","2","197","58","2018-09-25T03:26:00Z","2017-01-14T21:07:57Z"
|
ATPMiniDump.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*ATPMiniDump*",".{0,1000}ATPMiniDump.{0,1000}","offensive_tool_keyword","ATPMiniDump","Dumping LSASS memory with MiniDumpWriteDump on PssCaptureSnapShot to evade WinDefender ATP credential-theft. Take a look at this blog post for details. ATPMiniDump was created starting from Outflank-Dumpert then big credits to @Cneelis","T1003 - T1005 - T1055 - T1218","TA0006 - TA0008 - TA0011","N/A","N/A","Credential Access","https://github.com/b4rtik/ATPMiniDump","1","1","N/A","N/A","N/A","3","253","48","2019-12-02T15:01:22Z","2019-11-29T19:49:54Z"
|
AVKiller.csv
ADDED
|
@@ -0,0 +1,12 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AVKiller.git*",".{0,1000}\/AVKiller\.git.{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","1","N/A","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 3 |
+
"*1y0n/AVKiller*",".{0,1000}1y0n\/AVKiller.{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","1","N/A","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 4 |
+
"*6eac306cec3650ed8740d82024380ccaaea2ac4b8f6b55119a9e5fb82485f67f*",".{0,1000}6eac306cec3650ed8740d82024380ccaaea2ac4b8f6b55119a9e5fb82485f67f.{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 5 |
+
"*ba99e7ff67fb59ab551943030c912a2dfa0c9f1e1bba2c3e53a71aa5348386ec*",".{0,1000}ba99e7ff67fb59ab551943030c912a2dfa0c9f1e1bba2c3e53a71aa5348386ec.{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 6 |
+
"*dd35d7c7b99d5a0a182ff16546ebee8af08ee92510157d6f02355bae256d6191*",".{0,1000}dd35d7c7b99d5a0a182ff16546ebee8af08ee92510157d6f02355bae256d6191.{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 7 |
+
"*https://mp.weixin.qq.com/s/GDPAC_9-Pxfcj_z0_C_ixw*",".{0,1000}https\:\/\/mp\.weixin\.qq\.com\/s\/GDPAC_9\-Pxfcj_z0_C_ixw.{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","1","N/A","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 8 |
+
"*TerminateProcessFromId(ID(""360rp.exe"")*",".{0,1000}TerminateProcessFromId\(ID\(\""360rp\.exe\""\).{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 9 |
+
"*TerminateProcessFromId(ID(""360rps.exe"")*",".{0,1000}TerminateProcessFromId\(ID\(\""360rps\.exe\""\).{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 10 |
+
"*TerminateProcessFromId(ID(""360sd.exe"")*",".{0,1000}TerminateProcessFromId\(ID\(\""360sd\.exe\""\).{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 11 |
+
"*TerminateProcessFromId(ID(""360tray.exe"")*",".{0,1000}TerminateProcessFromId\(ID\(\""360tray\.exe\""\).{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
| 12 |
+
"*TerminateProcessFromId(ID(""ZhuDongFangYu.exe"")*",".{0,1000}TerminateProcessFromId\(ID\(\""ZhuDongFangYu\.exe\""\).{0,1000}","offensive_tool_keyword","AVKiller","forcibly close some anti-virus processes through process injection (taking 360 Security Guard and 360 Anti-Virus as examples)","T1055.011 - T1089","TA0005 ","N/A","N/A","Defense Evasion","https://github.com/1y0n/AVKiller","1","0","#filehash","N/A","10","2","118","15","2023-12-26T05:47:55Z","2023-12-19T00:55:23Z"
|
AV_Evasion_Tool.csv
ADDED
|
@@ -0,0 +1,68 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AV_Evasion_Tool.git*",".{0,1000}\/AV_Evasion_Tool\.git.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","1","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 3 |
+
"*\\Windows\\Temp\\Yanri_res.rc*",".{0,1000}\\\\Windows\\\\Temp\\\\Yanri_res\.rc.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 4 |
+
"*\Temp\YANRI_TEMP_*",".{0,1000}\\Temp\\YANRI_TEMP_.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 5 |
+
"*03963c5f7fbaf997cc971aa4a2367f68eb694f3cc35fe9408e423f1919c356a1*",".{0,1000}03963c5f7fbaf997cc971aa4a2367f68eb694f3cc35fe9408e423f1919c356a1.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 6 |
+
"*03e553f277ccbe4916eefcd15c17178c7690c64d8533073c86c4a60481649239*",".{0,1000}03e553f277ccbe4916eefcd15c17178c7690c64d8533073c86c4a60481649239.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 7 |
+
"*1958310b6f2ab97181768cdebab34fd9eff9218280b9a6a753800009ded8f9b7*",".{0,1000}1958310b6f2ab97181768cdebab34fd9eff9218280b9a6a753800009ded8f9b7.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 8 |
+
"*1y0n/AV_Evasion_Tool*",".{0,1000}1y0n\/AV_Evasion_Tool.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","1","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 9 |
+
"*2bedfede524b3c27ab02fcdc3fd4b7e54c1aa83cad0e7642ff4c70700f51355a*",".{0,1000}2bedfede524b3c27ab02fcdc3fd4b7e54c1aa83cad0e7642ff4c70700f51355a.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 10 |
+
"*2d3968ad60bdbc9528f95568aba38693ade0090f8d57707dc3e288d792587a35*",".{0,1000}2d3968ad60bdbc9528f95568aba38693ade0090f8d57707dc3e288d792587a35.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 11 |
+
"*2ff605e64eb4fa723b59b90f9ef36c5aeb4332695367697e91997a5b6dc463ba*",".{0,1000}2ff605e64eb4fa723b59b90f9ef36c5aeb4332695367697e91997a5b6dc463ba.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 12 |
+
"*309a7793f785eec671771cbf3bdb33f17cfd71702d0bfc482f6780c8aaa66876*",".{0,1000}309a7793f785eec671771cbf3bdb33f17cfd71702d0bfc482f6780c8aaa66876.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 13 |
+
"*3a5252edbc3926fde111e30235830dd0cbcb8f89efab7c24864db2a5399a5c3c*",".{0,1000}3a5252edbc3926fde111e30235830dd0cbcb8f89efab7c24864db2a5399a5c3c.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 14 |
+
"*3fbcc1db198e03bc5d6087c69e311fd97fe9861a7721526e9ea1d44e2398d022*",".{0,1000}3fbcc1db198e03bc5d6087c69e311fd97fe9861a7721526e9ea1d44e2398d022.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 15 |
+
"*425f2ddd85773aaf592043762f9132ef2173ef8ec2e69ce2d049d329dd9685b2*",".{0,1000}425f2ddd85773aaf592043762f9132ef2173ef8ec2e69ce2d049d329dd9685b2.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 16 |
+
"*45ff440d387c984f8bd7be1d1bc77cd9eaf70aa513a2a4c80189294a0f70c411*",".{0,1000}45ff440d387c984f8bd7be1d1bc77cd9eaf70aa513a2a4c80189294a0f70c411.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 17 |
+
"*46ba6286810d79be37facbd8c315a35acc1d49dc012870a50014eaff1bcd1fbd*",".{0,1000}46ba6286810d79be37facbd8c315a35acc1d49dc012870a50014eaff1bcd1fbd.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 18 |
+
"*4b7f6f3571fda33d3c305207518d9a7a8f328e2828f249735368beb8b6f04210*",".{0,1000}4b7f6f3571fda33d3c305207518d9a7a8f328e2828f249735368beb8b6f04210.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 19 |
+
"*4e352b020c8f888cb620a64282df6b60a862f905e831101d060a0fbdbbb25932*",".{0,1000}4e352b020c8f888cb620a64282df6b60a862f905e831101d060a0fbdbbb25932.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 20 |
+
"*4ef27da3276651f20e1d401412bb95c823f277b7a28f693eed55f819aa65e7bf*",".{0,1000}4ef27da3276651f20e1d401412bb95c823f277b7a28f693eed55f819aa65e7bf.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 21 |
+
"*59f031b1f9b71d2166f1b281b3ffbe40e3985d3a739d1761e59434a0032bf5c6*",".{0,1000}59f031b1f9b71d2166f1b281b3ffbe40e3985d3a739d1761e59434a0032bf5c6.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 22 |
+
"*5ea4f3837040a1342e8eed81e10d5dcf1e28f1b67478d8cd421007201758995f*",".{0,1000}5ea4f3837040a1342e8eed81e10d5dcf1e28f1b67478d8cd421007201758995f.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 23 |
+
"*65f5366b645bcc846eb270d514fd8f1c777a3a7b7534a6364e251268e9741346*",".{0,1000}65f5366b645bcc846eb270d514fd8f1c777a3a7b7534a6364e251268e9741346.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 24 |
+
"*6a9a3b838e5547654d9b0d9024e2afcaa0ad721de33499d192684cda337d49f5*",".{0,1000}6a9a3b838e5547654d9b0d9024e2afcaa0ad721de33499d192684cda337d49f5.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 25 |
+
"*723dfeeb1318c43343f21b49f3ae06a9b3d5e2d4ae5dda61fb57bee39a7b30da*",".{0,1000}723dfeeb1318c43343f21b49f3ae06a9b3d5e2d4ae5dda61fb57bee39a7b30da.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 26 |
+
"*7898617D-08D2-4297-ADFE-5EDD5C1B828B*",".{0,1000}7898617D\-08D2\-4297\-ADFE\-5EDD5C1B828B.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#GUIDproject","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 27 |
+
"*7fdb39ce9dcd83556dccda4a7480917b87ddef21edc96db5f0a1d134c40453cd*",".{0,1000}7fdb39ce9dcd83556dccda4a7480917b87ddef21edc96db5f0a1d134c40453cd.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 28 |
+
"*8819246132617282fade672cf544bff340d1a286980bce9c59b9ae41e221fc8f*",".{0,1000}8819246132617282fade672cf544bff340d1a286980bce9c59b9ae41e221fc8f.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 29 |
+
"*8a22596f3783d65822de3eee7a72899699d1fffb885404ddf9c1cb0b8b780442*",".{0,1000}8a22596f3783d65822de3eee7a72899699d1fffb885404ddf9c1cb0b8b780442.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 30 |
+
"*8db6879b0c3f33cf027515fb91fa397a09f2989ef9660b3243901ae38f6ace3c*",".{0,1000}8db6879b0c3f33cf027515fb91fa397a09f2989ef9660b3243901ae38f6ace3c.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 31 |
+
"*93d0d9ef1c1e2828b282ece1f3ce06624f1a27fca3d4a78e36fcaf672cf9c5b5*",".{0,1000}93d0d9ef1c1e2828b282ece1f3ce06624f1a27fca3d4a78e36fcaf672cf9c5b5.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 32 |
+
"*9cd7f22a7d202899c075a524124a9509bc5dffd09ff2e797074e074a1ad48a5c*",".{0,1000}9cd7f22a7d202899c075a524124a9509bc5dffd09ff2e797074e074a1ad48a5c.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 33 |
+
"*9da47a94bbb8d9322de8b7bb34958578776a47fdd440d2cca413fec7c78bc795*",".{0,1000}9da47a94bbb8d9322de8b7bb34958578776a47fdd440d2cca413fec7c78bc795.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 34 |
+
"*a425fc824f3bf40f82faad797a69b0fc2556dc79579f566891e75ee00920f7c0*",".{0,1000}a425fc824f3bf40f82faad797a69b0fc2556dc79579f566891e75ee00920f7c0.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 35 |
+
"*a6fa0c8acd7fae1a71d6f623caf345eb427b40db045c081f394b0e67e9bc14a5*",".{0,1000}a6fa0c8acd7fae1a71d6f623caf345eb427b40db045c081f394b0e67e9bc14a5.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 36 |
+
"*ab85375c8fcfcea1cf4135cc834b762c1006903496d70b795d4eb34cc6f754ec*",".{0,1000}ab85375c8fcfcea1cf4135cc834b762c1006903496d70b795d4eb34cc6f754ec.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 37 |
+
"*Advanced.AV.Evasion.Tool.For.Red.Team.exe*",".{0,1000}Advanced\.AV\.Evasion\.Tool\.For\.Red\.Team\.exe.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","1","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 38 |
+
"*b262b397386f413b6b815b409d54a9c5ae65dc0730c3d9918132a23f3d99a1da*",".{0,1000}b262b397386f413b6b815b409d54a9c5ae65dc0730c3d9918132a23f3d99a1da.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 39 |
+
"*b37aa3dcdebe406d652a4cfc3fb54168ea6525787fca00876452823f8b33605e*",".{0,1000}b37aa3dcdebe406d652a4cfc3fb54168ea6525787fca00876452823f8b33605e.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 40 |
+
"*b49abe3651b2e07c875f149d9931820ca27237d929814c94b2cfa32f1a445737*",".{0,1000}b49abe3651b2e07c875f149d9931820ca27237d929814c94b2cfa32f1a445737.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 41 |
+
"*b504d1a33068b6bde4059071fd7c89d8f9535185f6aad0d1e1361259f66fb529*",".{0,1000}b504d1a33068b6bde4059071fd7c89d8f9535185f6aad0d1e1361259f66fb529.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 42 |
+
"*b83dc319987bebf9dca8b6e85671f9bdced13236275598a29e8669842a225bbb*",".{0,1000}b83dc319987bebf9dca8b6e85671f9bdced13236275598a29e8669842a225bbb.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 43 |
+
"*b988905cfe09a6fb9a8f034a2efb0403731b2eeb29e19403d3eaade2b02fdfbd*",".{0,1000}b988905cfe09a6fb9a8f034a2efb0403731b2eeb29e19403d3eaade2b02fdfbd.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 44 |
+
"*ba7e216ca801f1b05c2cc100226b5d8f90263ee92f910a6febf637bb7ae3bec7*",".{0,1000}ba7e216ca801f1b05c2cc100226b5d8f90263ee92f910a6febf637bb7ae3bec7.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 45 |
+
"*bb62708fb9f961bffe55ec0fd74eead24e9d0b6c9e1ef054c845e7bc23af70a8*",".{0,1000}bb62708fb9f961bffe55ec0fd74eead24e9d0b6c9e1ef054c845e7bc23af70a8.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 46 |
+
"*c00ed94009fe6719c5c7803fe7d96a4930693897bc8335cb2c11d749052ffbdb*",".{0,1000}c00ed94009fe6719c5c7803fe7d96a4930693897bc8335cb2c11d749052ffbdb.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 47 |
+
"*c14cdcc5244fa9bb63ef50f28b2699c3cac0d42bd983ddb823a635842d0b143a*",".{0,1000}c14cdcc5244fa9bb63ef50f28b2699c3cac0d42bd983ddb823a635842d0b143a.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 48 |
+
"*c332926e2e1de5a7c696feebfd5996c8b78ef9a380a9e4a8da85a3485f0f3288*",".{0,1000}c332926e2e1de5a7c696feebfd5996c8b78ef9a380a9e4a8da85a3485f0f3288.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 49 |
+
"*c6323bd50315806228e24f7521ad096683beb5483bffb3eca4bbeb4f5a81d3f3*",".{0,1000}c6323bd50315806228e24f7521ad096683beb5483bffb3eca4bbeb4f5a81d3f3.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 50 |
+
"*c728e54e57a93ffbbe606d72fa12abb736236e7a1e263b49cf7e302de32f1100*",".{0,1000}c728e54e57a93ffbbe606d72fa12abb736236e7a1e263b49cf7e302de32f1100.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 51 |
+
"*d79d4da3258689d4510878b28b66c5bc15542107d6a25a6c2a55099a31762a22*",".{0,1000}d79d4da3258689d4510878b28b66c5bc15542107d6a25a6c2a55099a31762a22.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 52 |
+
"*d92e344caa4b6b913bad4f77a2bd6e771434a95a4fd2c8cea0fec75edba58568*",".{0,1000}d92e344caa4b6b913bad4f77a2bd6e771434a95a4fd2c8cea0fec75edba58568.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 53 |
+
"*d97e7cfd07d94c8282968f0334349056364f4e040a649f43577b9992204e2790*",".{0,1000}d97e7cfd07d94c8282968f0334349056364f4e040a649f43577b9992204e2790.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 54 |
+
"*e080a9a96cea5b322687be0113ce158715ba988532e3800d37a8690767c0d22e*",".{0,1000}e080a9a96cea5b322687be0113ce158715ba988532e3800d37a8690767c0d22e.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 55 |
+
"*e2fef0ec8523ec22594297061e813d69f48f47e33d99f2f96f63a0abc053aa51*",".{0,1000}e2fef0ec8523ec22594297061e813d69f48f47e33d99f2f96f63a0abc053aa51.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 56 |
+
"*e409901ebcba3869ad50844d6896bc466ef54546ceb06bd5949d9f667ade3e06*",".{0,1000}e409901ebcba3869ad50844d6896bc466ef54546ceb06bd5949d9f667ade3e06.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 57 |
+
"*e7fc34563fba238982ec178b82d38c2a182f3d5409a291a5a0ada363d5b292b0*",".{0,1000}e7fc34563fba238982ec178b82d38c2a182f3d5409a291a5a0ada363d5b292b0.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 58 |
+
"*eaa667b2ee62c5960b2a1ae23ec8edbdb89de0897960cf9f5117b721f519ae98*",".{0,1000}eaa667b2ee62c5960b2a1ae23ec8edbdb89de0897960cf9f5117b721f519ae98.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 59 |
+
"*eaf85e2ba4dd79f5ef5d8d18c5886dc8cde0e18e7341e6808baf3d9a5bafed7d*",".{0,1000}eaf85e2ba4dd79f5ef5d8d18c5886dc8cde0e18e7341e6808baf3d9a5bafed7d.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 60 |
+
"*f1c61181201c45d01a05a4c00d6e2f392e4afcf7c4133f71151ef6ad20887d17*",".{0,1000}f1c61181201c45d01a05a4c00d6e2f392e4afcf7c4133f71151ef6ad20887d17.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 61 |
+
"*f67a93fa0870a0ef178d165eb20fb77d60c1a87e5b82851c63aad115ffe90bd4*",".{0,1000}f67a93fa0870a0ef178d165eb20fb77d60c1a87e5b82851c63aad115ffe90bd4.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 62 |
+
"*f752cf3610b17c90e8a4b03ffd0dc9de1f2005108556708108f940e78d57bde6*",".{0,1000}f752cf3610b17c90e8a4b03ffd0dc9de1f2005108556708108f940e78d57bde6.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 63 |
+
"*f8fb6472ba4d0cd5bd54881ee9a69a9d5fec9f5b6e40ec1b3850208eb045db56*",".{0,1000}f8fb6472ba4d0cd5bd54881ee9a69a9d5fec9f5b6e40ec1b3850208eb045db56.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 64 |
+
"*fa66e3077a51a5ef7cb29ab869b483d7363e9bb58d84595de4e0b2b48e3df47b*",".{0,1000}fa66e3077a51a5ef7cb29ab869b483d7363e9bb58d84595de4e0b2b48e3df47b.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 65 |
+
"*fc9db4d8355ff19b09feb69b73f4c551a1e11158abaf795b16081b24f56b321a*",".{0,1000}fc9db4d8355ff19b09feb69b73f4c551a1e11158abaf795b16081b24f56b321a.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","#filehash","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 66 |
+
"*o0AAAAEFRQVBSUVZIMdJlSItSYD5Ii1IYPkiLUiA+SItyUD5ID7dK*",".{0,1000}o0AAAAEFRQVBSUVZIMdJlSItSYD5Ii1IYPkiLUiA\+SItyUD5ID7dK.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 67 |
+
"*pwd+c5eeCXJF7Mxr3qeKtaTa2727SSpvYnGD2ptzGMnNO0iye*",".{0,1000}pwd\+c5eeCXJF7Mxr3qeKtaTa2727SSpvYnGD2ptzGMnNO0iye.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
| 68 |
+
"*PwDxOWaXzpP3j/eP8RpnnSf89H/76NEv+uk/3j/OmYrqMLj/ADpf*",".{0,1000}PwDxOWaXzpP3j\/eP8RpnnSf89H\/76NEv\+uk\/3j\/OmYrqMLj\/ADpf.{0,1000}","offensive_tool_keyword","AV_Evasion_Tool","Undetectable Payload Generator Tool","T1027 - T1036 - T1059 - T1107","TA0005","N/A","N/A","Defense Evasion","https://github.com/1y0n/AV_Evasion_Tool","1","0","N/A","N/A","10","10","2637","407","2023-12-08T07:38:06Z","2020-04-24T01:11:09Z"
|
AWS-Loot.csv
ADDED
|
@@ -0,0 +1,9 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* awsloot.py*",".{0,1000}\sawsloot\.py.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","0","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
| 3 |
+
"*./awsloot *",".{0,1000}\.\/awsloot\s.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","0","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
| 4 |
+
"*./awsloot.py*",".{0,1000}\.\/awsloot\.py.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","1","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
| 5 |
+
"*/AWS-Loot*",".{0,1000}\/AWS\-Loot.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","1","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
| 6 |
+
"*/CodeBuildLooter.py*",".{0,1000}\/CodeBuildLooter\.py.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","1","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
| 7 |
+
"*/EC2Looter.py*",".{0,1000}\/EC2Looter\.py.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","1","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
| 8 |
+
"*/LambdaLooter.py*",".{0,1000}\/LambdaLooter\.py.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","1","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
| 9 |
+
"*awsloot.py *",".{0,1000}awsloot\.py\s.{0,1000}","offensive_tool_keyword","AWS-Loot","Searches an AWS environment looking for secrets. by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.","T1552","TA0002","N/A","N/A","Exploitation tool","https://github.com/sebastian-mora/AWS-Loot","1","0","N/A","N/A","N/A","1","69","25","2020-02-02T00:51:56Z","2020-02-02T00:25:46Z"
|
AbandonedCOMKeys.csv
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/AbandonedCOMKeys/*",".{0,1000}\/AbandonedCOMKeys\/.{0,1000}","offensive_tool_keyword","AbandonedCOMKeys","Enumerates abandoned COM keys (specifically InprocServer32). Useful for persistence","T1547.011 - T1049 - T1087.002","TA0005 - TA0007 - TA0003","N/A","N/A","Persistence","https://github.com/matterpreter/OffensiveCSharp/tree/master/AbandonedCOMKeys","1","1","N/A","N/A","10","10","1371","243","2023-02-06T14:56:26Z","2019-02-06T00:32:29Z"
|
| 3 |
+
"*\AbandonedCOMKeys.*",".{0,1000}\\AbandonedCOMKeys\..{0,1000}","offensive_tool_keyword","AbandonedCOMKeys","Enumerates abandoned COM keys (specifically InprocServer32). Useful for persistence","T1547.011 - T1049 - T1087.002","TA0005 - TA0007 - TA0003","N/A","N/A","Persistence","https://github.com/matterpreter/OffensiveCSharp/tree/master/AbandonedCOMKeys","1","0","N/A","N/A","10","10","1371","243","2023-02-06T14:56:26Z","2019-02-06T00:32:29Z"
|
Accomplice.csv
ADDED
|
@@ -0,0 +1,36 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* COMHijackToolkit.ps1*",".{0,1000}\sCOMHijackToolkit\.ps1.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 3 |
+
"* HijackDLL-Threads.dll*",".{0,1000}\sHijackDLL\-Threads\.dll.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 4 |
+
"*/Accomplice.git*",".{0,1000}\/Accomplice\.git.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 5 |
+
"*/COMHijackToolkit.ps1*",".{0,1000}\/COMHijackToolkit\.ps1.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 6 |
+
"*/COMInjectTarget.dll*",".{0,1000}\/COMInjectTarget\.dll.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 7 |
+
"*/HijackDLL-CreateRemoteThread.cpp*",".{0,1000}\/HijackDLL\-CreateRemoteThread\.cpp.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 8 |
+
"*/HijackDll-Process.cpp*",".{0,1000}\/HijackDll\-Process\.cpp.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 9 |
+
"*/HijackDLL-Threads.*",".{0,1000}\/HijackDLL\-Threads\..{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 10 |
+
"*\COMHijackToolkit.ps1*",".{0,1000}\\COMHijackToolkit\.ps1.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 11 |
+
"*\COMHijackToolkit\*",".{0,1000}\\COMHijackToolkit\\.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 12 |
+
"*\COMInject.exe*",".{0,1000}\\COMInject\.exe.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 13 |
+
"*\COMInject.sln*",".{0,1000}\\COMInject\.sln.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 14 |
+
"*\COMInjectTarget.cpp*",".{0,1000}\\COMInjectTarget\.cpp.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 15 |
+
"*\COMInjectTarget.dll*",".{0,1000}\\COMInjectTarget\.dll.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 16 |
+
"*\COMInjectTarget\*",".{0,1000}\\COMInjectTarget\\.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 17 |
+
"*\HijackDLL-CreateRemoteThread.*",".{0,1000}\\HijackDLL\-CreateRemoteThread\..{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 18 |
+
"*\HijackDLL-CreateRemoteThread\*",".{0,1000}\\HijackDLL\-CreateRemoteThread\\.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 19 |
+
"*\HijackDll-Process.*",".{0,1000}\\HijackDll\-Process\..{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 20 |
+
"*\HijackDLL-Threads.*",".{0,1000}\\HijackDLL\-Threads\..{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 21 |
+
"*06e8a15602cc6001db8ac6d14c4cf938a92aab83a446bcd5c2c4334ad4b44e6e*",".{0,1000}06e8a15602cc6001db8ac6d14c4cf938a92aab83a446bcd5c2c4334ad4b44e6e.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#filehash","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 22 |
+
"*1FDCAD33-E5D1-4D5F-ACD5-FA6F8661DFE5*",".{0,1000}1FDCAD33\-E5D1\-4D5F\-ACD5\-FA6F8661DFE5.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#GUIDproject","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 23 |
+
"*25aac4494a46799c4755d9bda39314d628134ee58dd6f724ee905373c3600343*",".{0,1000}25aac4494a46799c4755d9bda39314d628134ee58dd6f724ee905373c3600343.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#filehash","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 24 |
+
"*2a3035797a103e527b1645cb90fccf165b76deea5b1526d80f66e32f5082e0d0*",".{0,1000}2a3035797a103e527b1645cb90fccf165b76deea5b1526d80f66e32f5082e0d0.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#filehash","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 25 |
+
"*56cfc4ef19c92043b59bb88846ffd69725df417bd4c7adf14aa11e29a9428acc*",".{0,1000}56cfc4ef19c92043b59bb88846ffd69725df417bd4c7adf14aa11e29a9428acc.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#filehash","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 26 |
+
"*ADCEEFBA-CE43-4239-8AE8-7D8D43E66BB1*",".{0,1000}ADCEEFBA\-CE43\-4239\-8AE8\-7D8D43E66BB1.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#GUIDproject","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 27 |
+
"*BB8A69C4-18B0-4FF2-989C-F70778FFBCE6*",".{0,1000}BB8A69C4\-18B0\-4FF2\-989C\-F70778FFBCE6.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#GUIDproject","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 28 |
+
"*C37637FC-3792-4354-8F5B-7E319E4E5A6D*",".{0,1000}C37637FC\-3792\-4354\-8F5B\-7E319E4E5A6D.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#GUIDproject","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 29 |
+
"*c786890a660e4bca317ce667bc660504f8167a5d5965867d748ed02d0caa5046*",".{0,1000}c786890a660e4bca317ce667bc660504f8167a5d5965867d748ed02d0caa5046.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#filehash","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 30 |
+
"*COMInjectDotNet.exe*",".{0,1000}COMInjectDotNet\.exe.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 31 |
+
"*d80804bbcdbdd1933da9d9b7c0457ae73b85026e71970d1ab80af063b8fbac2e*",".{0,1000}d80804bbcdbdd1933da9d9b7c0457ae73b85026e71970d1ab80af063b8fbac2e.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#filehash","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 32 |
+
"*Extract-HijackableKeysFromProcmonCSV*",".{0,1000}Extract\-HijackableKeysFromProcmonCSV.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 33 |
+
"*F90C57DF-CDE4-4CDE-A2B9-9124C307D53A*",".{0,1000}F90C57DF\-CDE4\-4CDE\-A2B9\-9124C307D53A.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","#GUIDproject","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 34 |
+
"*Get-CLSIDRegistryKeys -RegHive *",".{0,1000}Get\-CLSIDRegistryKeys\s\-RegHive\s.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 35 |
+
"*Hijack-MultipleKeys -dll *",".{0,1000}Hijack\-MultipleKeys\s\-dll\s.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","0","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
| 36 |
+
"*nccgroup/Accomplice*",".{0,1000}nccgroup\/Accomplice.{0,1000}","offensive_tool_keyword","Accomplice","Tools for discovery and abuse of COM hijacks","T1120 - T1174","TA0007 - TA0003","N/A","N/A","Discovery","https://github.com/nccgroup/Accomplice","1","1","N/A","N/A","7","3","286","46","2019-10-15T21:54:09Z","2019-09-04T23:32:09Z"
|
Aclpwn.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*aclpwn.py*",".{0,1000}aclpwn\.py.{0,1000}","offensive_tool_keyword","Aclpwn","Aclpwn.py is a tool that interacts with BloodHound to identify and exploit ACL based privilege escalation paths. It takes a starting and ending point and will use Neo4j pathfinding algorithms to find the most efficient ACL based privilege escalation path. Aclpwn.py is similar to the PowerShell based Invoke-Aclpwn","T1098 - T1208 - T1550 - T1484 - T1486","TA0005 - TA0007","N/A","N/A","Exploitation tool","https://github.com/fox-it/aclpwn.py","1","0","N/A","N/A","N/A","8","701","107","2021-11-18T03:47:24Z","2018-12-04T18:45:04Z"
|
ActiveScanPlusPlus.csv
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/ActiveScanPlusPlus*",".{0,1000}\/ActiveScanPlusPlus.{0,1000}","offensive_tool_keyword","ActiveScanPlusPlus","ActiveScan++ extends Burp Suite's active and passive scanning capabilities. Designed to add minimal network overhead. it identifies application behaviour that may be of interest to advanced testers","T1583 - T1595 - T1190","TA0001 - TA0002 - TA0007 - TA0008","N/A","N/A","Discovery","https://github.com/albinowax/ActiveScanPlusPlus","1","1","N/A","network exploitation tool","N/A","6","584","181","2022-11-15T13:47:31Z","2014-06-23T10:04:13Z"
|
| 3 |
+
"*activeScan++.py*",".{0,1000}activeScan\+\+\.py.{0,1000}","offensive_tool_keyword","ActiveScanPlusPlus","ActiveScan++ extends Burp Suite's active and passive scanning capabilities. Designed to add minimal network overhead. it identifies application behaviour that may be of interest to advanced testers","T1583 - T1595 - T1190","TA0001 - TA0002 - TA0007 - TA0008","N/A","N/A","Discovery","https://github.com/albinowax/ActiveScanPlusPlus","1","1","N/A","network exploitation tool","7","6","584","181","2022-11-15T13:47:31Z","2014-06-23T10:04:13Z"
|
| 4 |
+
"*from burp import *",".{0,1000}from\sburp\simport\s.{0,1000}","offensive_tool_keyword","ActiveScanPlusPlus","ActiveScan++ extends Burp Suite's active and passive scanning capabilities. Designed to add minimal network overhead. it identifies application behaviour that may be of interest to advanced testers","T1583 - T1595 - T1190","TA0001 - TA0002 - TA0007 - TA0008","N/A","N/A","Discovery","https://github.com/albinowax/ActiveScanPlusPlus","1","0","N/A","network exploitation tool","N/A","6","584","181","2022-11-15T13:47:31Z","2014-06-23T10:04:13Z"
|
Acunetix Web Vulnerability Scanner.csv
ADDED
|
@@ -0,0 +1,14 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/webvulnscan1*.exe*",".{0,1000}\/webvulnscan1.{0,1000}\.exe.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","1","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 3 |
+
"*/webvulnscan2*.exe*",".{0,1000}\/webvulnscan2.{0,1000}\.exe.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","1","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 4 |
+
"*/webvulnscan3*.exe*",".{0,1000}\/webvulnscan3.{0,1000}\.exe.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","1","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 5 |
+
"*\Program Files (x86)\Acunetix\Web Vulnerability Scanner*",".{0,1000}\\Program\sFiles\s\(x86\)\\Acunetix\\Web\sVulnerability\sScanner.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 6 |
+
"*\ProgramData\Acunetix WVS *",".{0,1000}\\ProgramData\\Acunetix\sWVS\s.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 7 |
+
"*\webvulnscan1*.exe*",".{0,1000}\\webvulnscan1.{0,1000}\.exe.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 8 |
+
"*\webvulnscan10_Trial*",".{0,1000}\\webvulnscan10_Trial.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 9 |
+
"*\webvulnscan2*.exe*",".{0,1000}\\webvulnscan2.{0,1000}\.exe.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 10 |
+
"*\webvulnscan3*.exe*",".{0,1000}\\webvulnscan3.{0,1000}\.exe.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 11 |
+
"*\WVS_InstDBLogFile.csv*",".{0,1000}\\WVS_InstDBLogFile\.csv.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 12 |
+
"*\WVSScheduler.exe*",".{0,1000}\\WVSScheduler\.exe.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","1","N/A","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 13 |
+
"*>Acunetix Web Vulnerability Scanner (Trial Edition)<*",".{0,1000}\>Acunetix\sWeb\sVulnerability\sScanner\s\(Trial\sEdition\)\<.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","#productname","N/A","8","9","N/A","N/A","N/A","N/A"
|
| 14 |
+
"*>Acunetix Web Vulnerability Scanner<*",".{0,1000}\>Acunetix\sWeb\sVulnerability\sScanner\<.{0,1000}","greyware_tool_keyword","Acunetix Web Vulnerability Scanner","Vulnerability Scanner abused by threat actors","T1190 - T1046 - T1210 - T1213","TA0001 - TA0008 - TA0009","N/A","Clever Kitten - EMBER BEAR","Vulnerability Scanner","https://www.acunetix.com/vulnerability-scanner/","1","0","#productname","N/A","8","9","N/A","N/A","N/A","N/A"
|
AdGuard VPN.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*hhdobjgopfphlmjbmnpglhfcgppchgje*",".{0,1000}hhdobjgopfphlmjbmnpglhfcgppchgje.{0,1000}","greyware_tool_keyword","AdGuard VPN","External VPN usage within coporate network","T1090.003 - T1133 - T1572","TA0003 - TA0001 - TA0011 - TA0010 - TA0005","N/A","N/A","Data Exfiltration","https://raw.githubusercontent.com/SigmaHQ/sigma/43277f26fc1c81fc98fc79147b711189e901b757/rules/windows/registry/registry_set/registry_set_chrome_extension.yml","1","0","#registry","detection in registry","8","10","N/A","N/A","N/A","N/A"
|
Adamantium-Thief.csv
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*.exe BOOKMARKS*",".{0,1000}\.exe\sBOOKMARKS.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 3 |
+
"*.exe COOKIES*",".{0,1000}\.exe\sCOOKIES.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 4 |
+
"*.exe CREDIT_CARDS*",".{0,1000}\.exe\sCREDIT_CARDS.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 5 |
+
"*/Adamantium-Thief.git*",".{0,1000}\/Adamantium\-Thief\.git.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","1","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 6 |
+
"*/Stealer.exe*",".{0,1000}\/Stealer\.exe.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","1","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 7 |
+
"*/Stealer.sln*",".{0,1000}\/Stealer\.sln.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","1","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 8 |
+
"*\Stealer.exe*",".{0,1000}\\Stealer\.exe.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 9 |
+
"*\Stealer.sln*",".{0,1000}\\Stealer\.sln.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 10 |
+
"*\Stealer\modules\Passwords.cs*",".{0,1000}\\Stealer\\modules\\Passwords\.cs.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 11 |
+
"*\Stealer\Stealer\modules\*",".{0,1000}\\Stealer\\Stealer\\modules\\.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 12 |
+
"*Adamantium-Thief-master*",".{0,1000}Adamantium\-Thief\-master.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","1","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 13 |
+
"*Coded by LimerBoy <3*",".{0,1000}Coded\sby\sLimerBoy\s\<3.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 14 |
+
"*E6104BC9-FEA9-4EE9-B919-28156C1F2EDE*",".{0,1000}E6104BC9\-FEA9\-4EE9\-B919\-28156C1F2EDE.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","#GUIDproject","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 15 |
+
"*LimerBoy/Adamantium-Thief*",".{0,1000}LimerBoy\/Adamantium\-Thief.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","1","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 16 |
+
"*Please select command [PASSWORDS/HISTORY/COOKIES/AUTOFILL/CREDIT_CARDS/BOOKMARKS]*",".{0,1000}Please\sselect\scommand\s\[PASSWORDS\/HISTORY\/COOKIES\/AUTOFILL\/CREDIT_CARDS\/BOOKMARKS\].{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
| 17 |
+
"*Stealer.exe *",".{0,1000}Stealer\.exe\s.{0,1000}","offensive_tool_keyword","Adamantium-Thief","Decrypt chromium based browsers passwords - cookies - credit cards - history - bookmarks and autofill.","T1555 - T1003","TA0006","N/A","N/A","Credential Access","https://github.com/LimerBoy/Adamantium-Thief","1","0","N/A","N/A","10","8","788","200","2022-12-08T11:06:46Z","2020-03-01T06:50:15Z"
|
Adblock Office VPN Proxy Server.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*lcmammnjlbmlbcaniggmlejfjpjagiia*",".{0,1000}lcmammnjlbmlbcaniggmlejfjpjagiia.{0,1000}","greyware_tool_keyword","Adblock Office VPN Proxy Server","External VPN usage within coporate network","T1090.003 - T1133 - T1572","TA0003 - TA0001 - TA0011 - TA0010 - TA0005","N/A","N/A","Data Exfiltration","https://raw.githubusercontent.com/SigmaHQ/sigma/43277f26fc1c81fc98fc79147b711189e901b757/rules/windows/registry/registry_set/registry_set_chrome_extension.yml","1","0","#registry","detection in registry","8","10","N/A","N/A","N/A","N/A"
|
Adcheck.csv
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* ADcheck.py*",".{0,1000}\sADcheck\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 3 |
+
"* --bloodhound-file *",".{0,1000}\s\-\-bloodhound\-file\s.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 4 |
+
"* GPOBrowser.py*",".{0,1000}\sGPOBrowser\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 5 |
+
"* SmallSecretsDump.py*",".{0,1000}\sSmallSecretsDump\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 6 |
+
"*/ADcheck.git*",".{0,1000}\/ADcheck\.git.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","1","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 7 |
+
"*/ADcheck.py*",".{0,1000}\/ADcheck\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","1","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 8 |
+
"*/GPOBrowser.py*",".{0,1000}\/GPOBrowser\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","1","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 9 |
+
"*/SmallSecretsDump.py*",".{0,1000}\/SmallSecretsDump\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","1","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 10 |
+
"*\ADcheck.py*",".{0,1000}\\ADcheck\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 11 |
+
"*\ADcheck\Scripts\activate*",".{0,1000}\\ADcheck\\Scripts\\activate.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 12 |
+
"*\ADcheck-main*",".{0,1000}\\ADcheck\-main.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 13 |
+
"*\GPOBrowser.py*",".{0,1000}\\GPOBrowser\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 14 |
+
"*\SmallSecretsDump.py*",".{0,1000}\\SmallSecretsDump\.py.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 15 |
+
"*29169875afabc27c2b4184d94689aae0955a6d8a7d11788fa3337efd807077ba*",".{0,1000}29169875afabc27c2b4184d94689aae0955a6d8a7d11788fa3337efd807077ba.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","#filehash","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 16 |
+
"*admin_can_be_delegated(self)*",".{0,1000}admin_can_be_delegated\(self\).{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 17 |
+
"*asreproast(*",".{0,1000}asreproast\(.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 18 |
+
"*bdc2c691a61df0926160a728c8419244fa2a1523bf3a3c61a353afa78d80cbfe*",".{0,1000}bdc2c691a61df0926160a728c8419244fa2a1523bf3a3c61a353afa78d80cbfe.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","#filehash","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 19 |
+
"*CobblePot59/ADcheck*",".{0,1000}CobblePot59\/ADcheck.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","1","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 20 |
+
"*f4a493d7a8c194fa599d23d6302a5bd7092fe01a60d7803688546b8cb68d8bf4*",".{0,1000}f4a493d7a8c194fa599d23d6302a5bd7092fe01a60d7803688546b8cb68d8bf4.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","#filehash","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 21 |
+
"*kerberoast(self)*",".{0,1000}kerberoast\(self\).{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 22 |
+
"*krbtgt_password_age(self)*",".{0,1000}krbtgt_password_age\(self\).{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
| 23 |
+
"*python -m venv ADcheck*",".{0,1000}python\s\-m\svenv\sADcheck.{0,1000}","offensive_tool_keyword","Adcheck","Assess the security of your Active Directory with few or all privileges. This tool offers functionalities similar to PingCastle","T1087 - T1012 - T1482 - T1059 - T1203 - T1212 - T1480 - T1552 - T1112 - T1207 - T1483 - T1113 - T1057 - T1136 - T1119 - T1082 - T1553 - T1140 - T1107 - T1078 - T1562","TA0001 - TA0002 - TA0003 - TA0004 - TA0005 - TA0006 - TA0007 - TA0008 - TA0009","N/A","N/A","Discovery","https://github.com/CobblePot59/Adcheck","1","0","N/A","N/A","10","2","125","18","2024-10-31T08:02:21Z","2024-05-10T13:54:45Z"
|
Adeleginator.csv
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* ADeleg.exe*",".{0,1000}\sADeleg\.exe.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 3 |
+
"*$ADelegReport*",".{0,1000}\$ADelegReport.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 4 |
+
"*$InsecureResourceDelegations*",".{0,1000}\$InsecureResourceDelegations.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 5 |
+
"*$InsecureTrusteeDelegations*",".{0,1000}\$InsecureTrusteeDelegations.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 6 |
+
"*/ADeleg.exe*",".{0,1000}\/ADeleg\.exe.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","1","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 7 |
+
"*/ADeleginator.git*",".{0,1000}\/ADeleginator\.git.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","1","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 8 |
+
"*/Invoke-Adeleginator*",".{0,1000}\/Invoke\-Adeleginator.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","1","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 9 |
+
"*/mtth-bfft/adeleg/releases*",".{0,1000}\/mtth\-bfft\/adeleg\/releases.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","1","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 10 |
+
"*[!] Insecure resource delegations found. Exporting report:*",".{0,1000}\[!\]\sInsecure\sresource\sdelegations\sfound\.\sExporting\sreport\:.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","#content","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 11 |
+
"*[!] Insecure trustee delegations found. Exporting report: *",".{0,1000}\[!\]\sInsecure\strustee\sdelegations\sfound\.\sExporting\sreport\:\s.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","#content","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 12 |
+
"*[+] No insecure resource delegations found. Eureka!*",".{0,1000}\[\+\]\sNo\sinsecure\sresource\sdelegations\sfound\.\sEureka!.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","#content","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 13 |
+
"*[+] No insecure trustee delegations found. Eureka!*",".{0,1000}\[\+\]\sNo\sinsecure\strustee\sdelegations\sfound\.\sEureka!.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","#content","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 14 |
+
"*[i] Checking for insecure trustee/resource delegations*",".{0,1000}\[i\]\sChecking\sfor\sinsecure\strustee\/resource\sdelegations.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 15 |
+
"*[i] Running ADeleg and creating *",".{0,1000}\[i\]\sRunning\sADeleg\sand\screating\s.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 16 |
+
"*\ADeleg.exe*",".{0,1000}\\ADeleg\.exe.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 17 |
+
"*\Adeleginator-main*",".{0,1000}\\Adeleginator\-main.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 18 |
+
"*ADeleg_InsecureResourceDelegationReport_*",".{0,1000}ADeleg_InsecureResourceDelegationReport_.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 19 |
+
"*ADeleg_InsecureTrusteeDelegationReport_*",".{0,1000}ADeleg_InsecureTrusteeDelegationReport_.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 20 |
+
"*Create-ADelegReport*",".{0,1000}Create\-ADelegReport.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 21 |
+
"*Find-InsecureResourceDelegations*",".{0,1000}Find\-InsecureResourceDelegations.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 22 |
+
"*Go, go ADeleginator!*",".{0,1000}Go,\sgo\sADeleginator!.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 23 |
+
"*Invoke-Adeleginator*",".{0,1000}Invoke\-Adeleginator.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 24 |
+
"*techspence/Adeleginator*",".{0,1000}techspence\/Adeleginator.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","1","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
| 25 |
+
"*Thank you for using ADeleginator. Godspeed! :O*",".{0,1000}Thank\syou\sfor\susing\sADeleginator\.\sGodspeed!\s\:O.{0,1000}","offensive_tool_keyword","Adeleginator","tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory","T1087 - T1136 - T1069","TA0007 - TA0003 - TA0004","N/A","N/A","Discovery","https://github.com/techspence/Adeleginator","1","0","N/A","N/A","6","2","151","17","2024-09-18T20:21:42Z","2024-03-04T03:44:52Z"
|
Admin2Sys.csv
ADDED
|
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*/Admin2Sys.git*",".{0,1000}\/Admin2Sys\.git.{0,1000}","offensive_tool_keyword","Admin2Sys","Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM","T1055.002 - T1078.003 - T1068","TA0002 - TA0004 - TA0003","N/A","N/A","Privilege Escalation","https://github.com/S12cybersecurity/Admin2Sys","1","1","N/A","N/A","10","1","46","17","2023-05-01T19:32:41Z","2023-05-01T18:50:51Z"
|
| 3 |
+
"*Admin2Sys.exe*",".{0,1000}Admin2Sys\.exe.{0,1000}","offensive_tool_keyword","Admin2Sys","Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM","T1055.002 - T1078.003 - T1068","TA0002 - TA0004 - TA0003","N/A","N/A","Privilege Escalation","https://github.com/S12cybersecurity/Admin2Sys","1","1","N/A","N/A","10","1","46","17","2023-05-01T19:32:41Z","2023-05-01T18:50:51Z"
|
| 4 |
+
"*Admin2Sys-main*",".{0,1000}Admin2Sys\-main.{0,1000}","offensive_tool_keyword","Admin2Sys","Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM","T1055.002 - T1078.003 - T1068","TA0002 - TA0004 - TA0003","N/A","N/A","Privilege Escalation","https://github.com/S12cybersecurity/Admin2Sys","1","1","N/A","N/A","10","1","46","17","2023-05-01T19:32:41Z","2023-05-01T18:50:51Z"
|
| 5 |
+
"*S12cybersecurity/Admin2Sys*",".{0,1000}S12cybersecurity\/Admin2Sys.{0,1000}","offensive_tool_keyword","Admin2Sys","Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM","T1055.002 - T1078.003 - T1068","TA0002 - TA0004 - TA0003","N/A","N/A","Privilege Escalation","https://github.com/S12cybersecurity/Admin2Sys","1","1","N/A","N/A","10","1","46","17","2023-05-01T19:32:41Z","2023-05-01T18:50:51Z"
|
Advanced-SQL-Injection-Cheatsheet.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*Advanced-SQL-Injection-Cheatsheet*",".{0,1000}Advanced\-SQL\-Injection\-Cheatsheet.{0,1000}","offensive_tool_keyword","Advanced-SQL-Injection-Cheatsheet","A cheat sheet that contains advanced queries for SQL Injection of all types.","T1071.001 - T1190 - T1059.007 - T1040","TA0001 - TA0009 - TA0011","N/A","N/A","Exploitation tool","https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet","1","1","N/A","N/A","N/A","10","2840","655","2023-05-13T17:15:20Z","2020-10-23T18:14:47Z"
|
AdvancedRun.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*AdvancedRun.exe /EXEFilename *\sc.exe*stop WinDefend*",".{0,1000}AdvancedRun\.exe\s\/EXEFilename\s.{0,1000}\\sc\.exe.{0,1000}stop\sWinDefend.{0,1000}","greyware_tool_keyword","AdvancedRun","nirsoft tool - Run a program with different settings that you choose","T1562 - T1089","TA0005","N/A","N/A","Defense Evasion","https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3","1","0","N/A","N/A","9","8","N/A","N/A","N/A","N/A"
|
Adzok.csv
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*\Adzok_Open_v*.jar*",".{0,1000}\\Adzok_Open_v.{0,1000}\.jar.{0,1000}","offensive_tool_keyword","Adzok","RAT tool - a variant of Adwind abused by TA","T1219 - T1105 - T1027 - T1059 - T1204","TA0011 - TA0005 - TA0002 - TA0008","N/A","Packrat","Malware","https://sourceforge.net/projects/adzok/files/Adzok_Open_v1.0.0.2.jar/download","1","0","N/A","N/A","8","8","N/A","N/A","N/A","N/A"
|
| 3 |
+
"*88147650f66ab1b4ec3d2a97ef8083ebd78cfdde63f7a5bad73b2d4e9e48a365*",".{0,1000}88147650f66ab1b4ec3d2a97ef8083ebd78cfdde63f7a5bad73b2d4e9e48a365.{0,1000}","offensive_tool_keyword","Adzok","RAT tool - a variant of Adwind abused by TA","T1219 - T1105 - T1027 - T1059 - T1204","TA0011 - TA0005 - TA0002 - TA0008","N/A","Packrat","Malware","https://sourceforge.net/projects/adzok/files/Adzok_Open_v1.0.0.2.jar/download","1","0","#filehash","N/A","8","8","N/A","N/A","N/A","N/A"
|
| 4 |
+
"*A Variant Of Java/Adwind.SN*",".{0,1000}A\sVariant\sOf\sJava\/Adwind\.SN.{0,1000}","signature_keyword","Adzok","RAT tool - a variant of Adwind abused by TA","T1219 - T1105 - T1027 - T1059 - T1204","TA0011 - TA0005 - TA0002 - TA0008","N/A","Packrat","Malware","https://sourceforge.net/projects/adzok/files/Adzok_Open_v1.0.0.2.jar/download","1","0","#Avsignature","N/A","8","8","N/A","N/A","N/A","N/A"
|
| 5 |
+
"*Adwind!jar*",".{0,1000}Adwind!jar.{0,1000}","signature_keyword","Adzok","RAT tool - a variant of Adwind abused by TA","T1219 - T1105 - T1027 - T1059 - T1204","TA0011 - TA0005 - TA0002 - TA0008","N/A","Packrat","Malware","https://sourceforge.net/projects/adzok/files/Adzok_Open_v1.0.0.2.jar/download","1","0","#Avsignature","N/A","8","8","N/A","N/A","N/A","N/A"
|
| 6 |
+
"*http://adzok.net/downloadfree.php*",".{0,1000}http\:\/\/adzok\.net\/downloadfree\.php.{0,1000}","offensive_tool_keyword","Adzok","RAT tool - a variant of Adwind abused by TA","T1219 - T1105 - T1027 - T1059 - T1204","TA0011 - TA0005 - TA0002 - TA0008","N/A","Packrat","Malware","https://sourceforge.net/projects/adzok/files/Adzok_Open_v1.0.0.2.jar/download","1","1","N/A","N/A","8","8","N/A","N/A","N/A","N/A"
|
| 7 |
+
"*http://sourceforge.net/projects/adzok/files/Adzok_Open_v1.0.0.2.jar/download*",".{0,1000}http\:\/\/sourceforge\.net\/projects\/adzok\/files\/Adzok_Open_v1\.0\.0\.2\.jar\/download.{0,1000}","offensive_tool_keyword","Adzok","RAT tool - a variant of Adwind abused by TA","T1219 - T1105 - T1027 - T1059 - T1204","TA0011 - TA0005 - TA0002 - TA0008","N/A","Packrat","Malware","https://sourceforge.net/projects/adzok/files/Adzok_Open_v1.0.0.2.jar/download","1","1","N/A","N/A","8","8","N/A","N/A","N/A","N/A"
|
AggressorScripts-1.csv
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*AggressorScripts*",".{0,1000}AggressorScripts.{0,1000}","offensive_tool_keyword","AggressorScripts-1","Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources","T1074 - T1070 - T1105 - T1558","TA0007 - TA0003 - TA0002 - TA0043","N/A","N/A","Exploitation tool","https://github.com/Cn33liz/AggressorScripts-1","1","1","N/A","N/A","N/A","1","2","1","2018-06-24T16:27:57Z","2019-10-18T12:56:35Z"
|
| 3 |
+
"*Persist.cna*",".{0,1000}Persist\.cna.{0,1000}","offensive_tool_keyword","AggressorScripts-1","persistence script for cobaltstrike. Persistence Aggressor Scripts for Cobalt Strike 3.0+","T1074 - T1070 - T1105 - T1558","TA0007 - TA0003 - TA0002 - TA0043","N/A","N/A","Exploitation tool","https://github.com/Cn33liz/AggressorScripts-1/tree/master/Persistence","1","1","N/A","N/A","N/A","1","2","1","2018-06-24T16:27:57Z","2019-10-18T12:56:35Z"
|
AhMyth-Android-RAT.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*AhMyth-Android-RAT*",".{0,1000}AhMyth\-Android\-RAT.{0,1000}","offensive_tool_keyword","AhMyth-Android-RAT","AhMyth Android Rat","T1020 - T1071 - T1071.001","TA0002 - TA0003","N/A","N/A","Exploitation tool","https://github.com/AhMyth/AhMyth-Android-RAT","1","0","N/A","N/A","N/A","10","4514","1703","2021-08-12T21:23:08Z","2017-07-07T03:03:37Z"
|
Ahk2Exe.csv
ADDED
|
@@ -0,0 +1,42 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"* Ahk2Exe.exe*",".{0,1000}\sAhk2Exe\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 3 |
+
"*/Ahk2Exe.exe*",".{0,1000}\/Ahk2Exe\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 4 |
+
"*/Ahk2Exe.git*",".{0,1000}\/Ahk2Exe\.git.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 5 |
+
"*/Ahk2Exe.zip*",".{0,1000}\/Ahk2Exe\.zip.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 6 |
+
"*/Ahk2Exe1.*.zip*",".{0,1000}\/Ahk2Exe1\..{0,1000}\.zip.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 7 |
+
"*/ahk-install.exe*",".{0,1000}\/ahk\-install\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 8 |
+
"*/ahk-v2.exe*",".{0,1000}\/ahk\-v2\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 9 |
+
"*/AutoHotkey_1*_setup.exe*",".{0,1000}\/AutoHotkey_1.{0,1000}_setup\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 10 |
+
"*/AutoHotkey_2*_setup.exe*",".{0,1000}\/AutoHotkey_2.{0,1000}_setup\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 11 |
+
"*/AutoHotkey64.exe*",".{0,1000}\/AutoHotkey64\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 12 |
+
"*/releases/download/Ahk2Exe*",".{0,1000}\/releases\/download\/Ahk2Exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 13 |
+
"*\Ahk2Exe.ahk*",".{0,1000}\\Ahk2Exe\.ahk.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 14 |
+
"*\Ahk2Exe.exe*",".{0,1000}\\Ahk2Exe\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 15 |
+
"*\Ahk2Exe.zip*",".{0,1000}\\Ahk2Exe\.zip.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 16 |
+
"*\AutoHotkey_1*_setup.exe*",".{0,1000}\\AutoHotkey_1.{0,1000}_setup\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 17 |
+
"*\AutoHotkey_2*_setup.exe*",".{0,1000}\\AutoHotkey_2.{0,1000}_setup\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 18 |
+
"*\AutoHotkey64.exe*",".{0,1000}\\AutoHotkey64\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 19 |
+
"*\AutoHotkey64_UIA.exe*",".{0,1000}\\AutoHotkey64_UIA\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 20 |
+
"*\AutoHotkeySC.bin*",".{0,1000}\\AutoHotkeySC\.bin.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 21 |
+
"*\AutoHotkeyU32.exe*",".{0,1000}\\AutoHotkeyU32\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 22 |
+
"*\AutoHotkeyUX.exe*",".{0,1000}\\AutoHotkeyUX\.exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 23 |
+
"*\Program Files\AutoHotkey*",".{0,1000}\\Program\sFiles\\AutoHotkey.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 24 |
+
"*\SetExeSubsystem.ahk*",".{0,1000}\\SetExeSubsystem\.ahk.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 25 |
+
"*\SOFTWARE\Classes\.ahk\*",".{0,1000}\\SOFTWARE\\Classes\\\.ahk\\.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 26 |
+
"*\SOFTWARE\Classes\AutoHotkeyScript\*",".{0,1000}\\SOFTWARE\\Classes\\AutoHotkeyScript\\.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 27 |
+
"*\UX\reset-assoc.ahk*",".{0,1000}\\UX\\reset\-assoc\.ahk.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 28 |
+
"*>AutoHotkey installer<*",".{0,1000}\>AutoHotkey\sinstaller\<.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 29 |
+
"*>AutoHotkey Setup<*",".{0,1000}\>AutoHotkey\sSetup\<.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 30 |
+
"*14a8b1ff0297c5f7c06c6ab36a257140c2f3d33e8c15a28e790d5039a29c00a7*",".{0,1000}14a8b1ff0297c5f7c06c6ab36a257140c2f3d33e8c15a28e790d5039a29c00a7.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 31 |
+
"*41092e2433211a876f2b14f16a29fdae85a0d7e74565b23ab9e9c85bee892351*",".{0,1000}41092e2433211a876f2b14f16a29fdae85a0d7e74565b23ab9e9c85bee892351.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 32 |
+
"*46d335c6ebda027aea00f5a8261b4d1a1763e17b858fe512bbe541f9bb66d464*",".{0,1000}46d335c6ebda027aea00f5a8261b4d1a1763e17b858fe512bbe541f9bb66d464.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 33 |
+
"*4e1e3123dd85d3ac65a0803b08dd89b9b12b5a00b9f566782855332d03e5fe26*",".{0,1000}4e1e3123dd85d3ac65a0803b08dd89b9b12b5a00b9f566782855332d03e5fe26.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 34 |
+
"*4f30ed7899506d15974d12e428f4647660f97a52cc21da06a6a295a06197bbd8*",".{0,1000}4f30ed7899506d15974d12e428f4647660f97a52cc21da06a6a295a06197bbd8.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 35 |
+
"*7a2aeb7256c40efa434c6fc95f920ee9b4555e526f2f7cd325b6dc482faa7c20*",".{0,1000}7a2aeb7256c40efa434c6fc95f920ee9b4555e526f2f7cd325b6dc482faa7c20.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 36 |
+
"*80840379e83b70528c541218023961323ae10cfd85b4a1dcf6bf0fc01a9336b7*",".{0,1000}80840379e83b70528c541218023961323ae10cfd85b4a1dcf6bf0fc01a9336b7.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 37 |
+
"*80ce06d9341317b4c4b4b1e89b2f046e0426e1e952eaa9152231cc26a08de58f*",".{0,1000}80ce06d9341317b4c4b4b1e89b2f046e0426e1e952eaa9152231cc26a08de58f.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 38 |
+
"*9f2c7f990c554ba286616dd08e59ac32d543e80eef335f5c65762c020234bc1b*",".{0,1000}9f2c7f990c554ba286616dd08e59ac32d543e80eef335f5c65762c020234bc1b.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 39 |
+
"*ab464ef9bfa3735111e4fbf0e21f34feecf29a66d8effce37814df6be1d8314b*",".{0,1000}ab464ef9bfa3735111e4fbf0e21f34feecf29a66d8effce37814df6be1d8314b.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","#filehash","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 40 |
+
"*AutoHotkey/Ahk2Exe*",".{0,1000}AutoHotkey\/Ahk2Exe.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 41 |
+
"*https://www.autohotkey.com/download/*",".{0,1000}https\:\/\/www\.autohotkey\.com\/download\/.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","1","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
| 42 |
+
"*s\AutoHotkey Window Spy.lnk*",".{0,1000}s\\AutoHotkey\sWindow\sSpy\.lnk.{0,1000}","greyware_tool_keyword","Ahk2Exe","Official AutoHotkey script compiler - misused in scripting malicious executables","T1059 - T1204 - T1036 - T1027","TA0002 - TA0005","N/A","N/A","Defense Evasion","https://github.com/AutoHotkey/Ahk2Exe","1","0","N/A","N/A","7","7","612","114","2024-08-10T23:15:47Z","2011-08-01T10:28:19Z"
|
Airbash.csv
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"keyword","metadata_keyword_regex","metadata_keyword_type","metadata_tool","metadata_description","metadata_tool_techniques","metadata_tool_tactics","metadata_malwares_name","metadata_groups_name","metadata_category","metadata_link","metadata_enable_endpoint_detection","metadata_enable_proxy_detection","metadata_tags","metadata_comment","metadata_severity_score","metadata_popularity_score","metadata_github_stars","metadata_github_forks","metadata_github_updated_at","metadata_github_created_at"
|
| 2 |
+
"*Airbash*",".{0,1000}Airbash.{0,1000}","offensive_tool_keyword","Airbash","A POSIX-compliant fully automated WPA PSK handshake capture script aimed at penetration testing.","T1565 - T1593 - T1594 - T1567","TA0002 - TA0007 - TA0009 - TA0010","N/A","N/A","Sniffing & Spoofing","https://github.com/tehw0lf/airbash","1","0","N/A","N/A","N/A","4","352","62","2024-10-13T01:02:18Z","2018-04-18T23:50:15Z"
|