0x3a / cryptowall
Cryptowall Tooling & Information
☆34Updated 8 years ago
Alternatives and similar repositories for cryptowall:
Users that are interested in cryptowall are comparing it to the libraries listed below
- Automated memory forensics analysis☆32Updated 5 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- Frontend for Codex Gigas☆21Updated 7 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- Some IR notes☆73Updated 8 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Volatility Plugins☆21Updated 9 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19Updated 9 years ago
- Scripts for dealing with various ek's☆69Updated 7 years ago
- Collection of my Python Scripts☆41Updated 4 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Plugins for the Volatility framework☆18Updated 9 years ago
- Manage VT Alerts☆62Updated 8 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 7 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Updated 9 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- ☆16Updated 10 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Configuration security audit framework☆23Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 9 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago