Neo23x0 / RaccineLinks
A Simple Ransomware Vaccine
☆965Updated last year
Alternatives and similar repositories for Raccine
Users that are interested in Raccine are comparing it to the libraries listed below
Sorting:
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,270Updated 2 years ago
- Sophos-originated indicators-of-compromise from published reports☆600Updated 3 weeks ago
- Online hash checker for Virustotal and other services☆829Updated 3 months ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,221Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,276Updated last year
- All sysmon event types and their fields explained☆552Updated 3 years ago
- ☆561Updated 2 years ago
- ReversingLabs YARA Rules☆823Updated 2 weeks ago
- CyLR - Live Response Collection Tool☆682Updated 3 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,790Updated 3 weeks ago
- Bloodhound Reporting for Blue and Purple Teams☆1,200Updated 4 months ago
- Digital Forensics Investigation Platform☆830Updated 8 months ago
- A Powershell incident response framework☆1,607Updated 2 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆783Updated 2 years ago
- Utilities for Sysmon☆1,529Updated 3 months ago
- A repository for using windows event forwarding for incident detection and response☆1,267Updated 10 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆852Updated 3 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,403Updated last year
- Some usefull Scripts and Executables for Pentest & Forensics☆1,121Updated 7 months ago
- Repository of YARA rules made by Trellix ATR Team☆600Updated 3 months ago
- ☆772Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,801Updated 4 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆921Updated last year
- Defences against Cobalt Strike☆1,288Updated 2 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,181Updated last month
- ☆2,289Updated last year
- Tools for hunting for threats.☆583Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,287Updated 5 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,190Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,659Updated last week