Common framework for designing a detection and response framework for the most common MFT solutions
☆16Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for MFT-Detect-Response
Users that are interested in MFT-Detect-Response are comparing it to the libraries listed below
Sorting:
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- ☆20Jul 4, 2022Updated 3 years ago
- ☆25Jul 12, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- agisoft photogrammetry processing scripts☆12Mar 18, 2016Updated 9 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Ludus range for the Constructing Defense Lab☆102Updated this week
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Infrastructure Bot for your organization☆10Jun 9, 2025Updated 8 months ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- ☆105Jul 5, 2025Updated 7 months ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- ☆11Jun 15, 2022Updated 3 years ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- An IP Logger☆12Jun 10, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Recordization library☆11Updated this week
- Patient handling for SENAITE☆10Jan 11, 2026Updated last month
- ☆14Feb 18, 2026Updated last week
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Data collection forms builder for NextGIS Mobile☆12Apr 9, 2025Updated 10 months ago
- ☆11May 2, 2022Updated 3 years ago
- Quantitative analysis of location reports from Apple's offline finding (OF) location tracking system☆10Apr 20, 2021Updated 4 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- ☆11Aug 28, 2024Updated last year
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆81Sep 11, 2025Updated 5 months ago