Try adjusting your search or filter criteria
Curated collection of "Living off the Land" and security research projects
Living Off the Orchard: macOS binaries used by threat actors for post-exploitation.
Windows drivers used by adversaries to bypass security controls and gain kernel access.
Living Off Trusted Sites: Popular legitimate domains abused for phishing and C2 communications.
Benign applications that exhibit suspicious behaviors, complicating threat detection.
Curated list of DLL Hijacking candidates for privilege escalation and persistence.
Comprehensive database of file extensions being weaponized by attackers.