Fr3akaLmaTT3r / decryptor
☆26Updated 3 years ago
Alternatives and similar repositories for decryptor:
Users that are interested in decryptor are comparing it to the libraries listed below
- ☆23Updated 2 months ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- General Content☆26Updated 9 months ago
- ☆38Updated 3 years ago
- Indicators of Normality☆12Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 4 months ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆51Updated last year
- ☆14Updated 2 years ago
- ☆15Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- ☆23Updated last year
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 2 months ago
- C# User Simulation☆32Updated 2 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆36Updated 2 weeks ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago