HIBC2017 / WANNAFIXLinks
WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack
☆52Updated 6 years ago
Alternatives and similar repositories for WANNAFIX
Users that are interested in WANNAFIX are comparing it to the libraries listed below
Sorting:
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- Repo for autosnort scripts.☆157Updated 5 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Updated 2 years ago
- Interactive remote PowerShell Payload☆78Updated 9 years ago
- RWMC is no longer supported. Please use PowerMemory.☆164Updated 9 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 10 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆254Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 7 months ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33Updated 9 years ago
- ☆48Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- MS17-010 Windows SMB RCE -- Full subnet scanner☆24Updated 8 years ago
- This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.☆42Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Veil Catapult is no longer supported☆75Updated 9 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 10 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- VirusTotal tools☆92Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago