MikeHorn-git / WAFSLinks
Hardened your Windows OS against forensics analysis
☆22Updated 11 months ago
Alternatives and similar repositories for WAFS
Users that are interested in WAFS are comparing it to the libraries listed below
Sorting:
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 10 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆50Updated last month
- information about ransomware groups (Ransomware Analysis Notes)☆39Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated 11 months ago
- Detonate malware on VMs and get logs & detection status☆59Updated this week
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 9 months ago
- Detection Engineering Tools☆17Updated last week
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆31Updated 10 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- Baseline a Windows System against LOLBAS☆68Updated last year
- ☆27Updated 11 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 8 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆89Updated 2 months ago
- Configuration Extractors for Malware☆117Updated 6 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- PowerShell Script Analyzer☆70Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆104Updated 2 months ago
- ☆34Updated last year
- ☆24Updated 8 months ago
- ☆49Updated 8 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Updated last year
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆113Updated 2 years ago
- Malware Analysis tools☆26Updated last year
- Yara Rules for Modern Malware☆79Updated last year