All Projects → BushidoUK → Abused-Legitimate-Services

BushidoUK / Abused-Legitimate-Services

Licence: other
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups

Projects that are alternatives of or similar to Abused-Legitimate-Services

Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+17123.81%)
Mutual labels:  malware, cybersecurity, cyber-threat-intelligence
Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+1354.76%)
Mutual labels:  malware, phishing, cybersecurity
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+13621.43%)
Mutual labels:  malware, cybersecurity, cyber-threat-intelligence
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+35.71%)
Mutual labels:  cybersecurity, cti, cyber-threat-intelligence
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+180.95%)
Mutual labels:  cybersecurity, cti, cyber-threat-intelligence
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-59.52%)
Mutual labels:  cybersecurity, cti, cyber-threat-intelligence
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+395.24%)
Mutual labels:  cybersecurity, cti, cyber-threat-intelligence
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1509.52%)
Mutual labels:  malware, phishing, cybersecurity
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+116.67%)
Mutual labels:  malware, cybersecurity, cti
Urlextractor
Information gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (+711.9%)
Mutual labels:  malware, phishing
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Stars: ✭ 380 (+804.76%)
Mutual labels:  malware, cybersecurity
Robust Adv Malware Detection
Code repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (+50%)
Mutual labels:  malware, cybersecurity
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+640.48%)
Mutual labels:  malware, cybersecurity
Awesome Cybersecurity
Curated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (+83.33%)
Mutual labels:  malware, cybersecurity
Malsub
A Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (+633.33%)
Mutual labels:  malware, cybersecurity
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+64.29%)
Mutual labels:  malware, cybersecurity
Phishing.database
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Stars: ✭ 296 (+604.76%)
Mutual labels:  malware, phishing
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+2595.24%)
Mutual labels:  malware, phishing
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+2883.33%)
Mutual labels:  malware, cybersecurity
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+188.1%)
Mutual labels:  malware, cybersecurity

Abused Legitimate Services

Legitimate third-party Platform-as-a-Service (PaaS) providers are becoming increasingly leveraged by threat actors for phishing and malware deployment. PaaS providers such as cloud instances, marketing platforms, content delivery networks (CDN), and dynamic DNS servers have been weaponised for a range of malicious activities. One of the key benefits is that they can be used to evade detection systems. This is due to the decreased likelihood of these being pre-emptively blocked because of established levels of trust and legitimate usage.

Detailed analysis in the blog here: https://blog.bushidotoken.net/2021/11/leveraging-legitimate-services-for.html

Abused Legitimate Services by Malware campaigns

Abused Legitimate Services by Phishing campaigns

Papers

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].