Neo23x0 / RewindLinks
Immediate Virus Infection Counter Measures
☆63Updated 4 years ago
Alternatives and similar repositories for Rewind
Users that are interested in Rewind are comparing it to the libraries listed below
Sorting:
- A canary designed to minimize the impact from certain Ransomware actors☆100Updated 4 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- ☆35Updated 4 years ago
- ☆38Updated 3 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 4 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- XOR Key Extractor☆50Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- Standardized Malware Analysis Tool☆55Updated 4 years ago
- Yara Based Detection Engine for web browsers☆49Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- C# User Simulation☆33Updated 3 years ago
- ☆15Updated 3 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- ☆150Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- A YARA Rule Performance Measurement Tool☆60Updated last year
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- Windows link file (shortcuts) examiner☆67Updated last year
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 6 years ago
- A simple python implementation of a BITS server.☆105Updated 3 years ago