Pinned Repositories
Creosote
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
CVE-2020-16898
CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
CVE-2020-16899
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
DarkSide-Config-Extract
DotDumper
An automatic unpacker and logger for DotNet Framework targeting files
GhidraScripts
Scripts to run within Ghidra, maintained by the Trellix ARC team
IOCs
Repository containing IOCs, CSV and MISP JSON from our blogs
NetLlix
A project created with an aim to emulate and test exfiltration of data over different network protocols.
xbypass
A tool to facilitate ROP Chain Development for XML Character Sanitization
Yara-Rules
Repository of YARA rules made by Trellix ATR Team
Trellix Advanced Research Center's Repositories
advanced-threat-research/Yara-Rules
Repository of YARA rules made by Trellix ATR Team
advanced-threat-research/DotDumper
An automatic unpacker and logger for DotNet Framework targeting files
advanced-threat-research/CVE-2020-16898
CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
advanced-threat-research/GhidraScripts
Scripts to run within Ghidra, maintained by the Trellix ARC team
advanced-threat-research/Creosote
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
advanced-threat-research/IOCs
Repository containing IOCs, CSV and MISP JSON from our blogs
advanced-threat-research/DarkSide-Config-Extract
advanced-threat-research/NetLlix
A project created with an aim to emulate and test exfiltration of data over different network protocols.
advanced-threat-research/CVE-2020-16899
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
advanced-threat-research/xbypass
A tool to facilitate ROP Chain Development for XML Character Sanitization
advanced-threat-research/Expert-Rules
advanced-threat-research/Ripple-20-Detection-Logic
Ripple20 Critical Vulnerabilities - Detection Logic and Signatures
advanced-threat-research/Threat-Reports
Repository to store the Threat Reports made by the McAfee Enterprise ATR Team
advanced-threat-research/ATR_HAX_CTF_2021
McAfee Enterprise Advanced Threat Research Capture the Flag
advanced-threat-research/DotDumperGUI
A graphical user interface to easily read through, and filter, DotDumper JSON-based logs
advanced-threat-research/ATR_HAX_CTF_2022
Trellix Advanced Threat Research CTF compitition of 2022
advanced-threat-research/FIDBs
FunctionID databases for Ghidra to recover function symbols with from stripped binaries
advanced-threat-research/BSim
BSim signatures and databases for Ghidra to recover function symbols with
advanced-threat-research/DotDumperNative
The native (unmanaged) library which contains hooks for native functions that are hooked using DotDumper
advanced-threat-research/Golang-Runtime-Binaries
A repository with a variety of compiled Golang binaries, each of which contains the entire Golang runtime for the given architecture for the specific Golang version
advanced-threat-research/Russian_CyberThreats_Yara
Repository with aggregated public source yara rules