Neo23x0 / RaccineLinks
A Simple Ransomware Vaccine
☆971Updated 2 years ago
Alternatives and similar repositories for Raccine
Users that are interested in Raccine are comparing it to the libraries listed below
Sorting:
- TrustedSec Sysinternals Sysmon Community Guide☆1,248Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,291Updated 2 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,307Updated 2 years ago
- Sophos-originated indicators-of-compromise from published reports☆635Updated 3 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆859Updated 3 years ago
- All sysmon event types and their fields explained☆559Updated 4 years ago
- Online hash checker for Virustotal and other services☆836Updated 7 months ago
- Tools for hunting for threats.☆599Updated 6 months ago
- ☆561Updated 2 years ago
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆725Updated 5 months ago
- Understand adversary tradecraft and improve detection strategies☆713Updated 2 years ago
- Defences against Cobalt Strike☆1,292Updated 3 years ago
- Encyclopedia for Executables☆459Updated 4 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆523Updated 4 years ago
- CyLR - Live Response Collection Tool☆693Updated 3 years ago
- Forensics artefact collection tool for systems running Microsoft Windows☆425Updated 7 months ago
- RegRipper3.0☆658Updated 11 months ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆538Updated 3 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆778Updated 2 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,240Updated this week
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,087Updated last week
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Updated 2 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆831Updated 11 months ago
- ☆640Updated 2 years ago
- Sysmon configuration file template with default high-quality event tracing☆524Updated last month
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆950Updated 4 years ago
- Timeline of Active Directory changes with replication metadata☆516Updated 7 months ago
- Repository of YARA rules made by Trellix ATR Team☆618Updated 8 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- Open EDR public repository☆2,549Updated last year