MikeHorn-git / WAFSLinks
Hardened your Windows OS against forensics analysis
☆21Updated 9 months ago
Alternatives and similar repositories for WAFS
Users that are interested in WAFS are comparing it to the libraries listed below
Sorting:
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ☆48Updated 6 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆38Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 8 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 5 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆88Updated 2 weeks ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- Configuration Extractors for Malware☆111Updated 4 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 7 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Make an Linux Kernel rootkit visible again.☆55Updated 6 months ago
- Malware Analysis tools☆26Updated 11 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 2 months ago
- ☆27Updated 9 months ago
- ☆68Updated 7 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Linux #rootkit and #malware revealer☆26Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- ☆29Updated last year
- ☆24Updated 6 months ago
- ☆37Updated last year
- PowerShell Script Analyzer☆70Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 8 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆37Updated 6 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- create a "simulated internet" cyber range environment☆18Updated 3 months ago