Common framework for designing a detection and response framework for the most common MFT solutions
☆16Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for MFT-Detect-Response
Users that are interested in MFT-Detect-Response are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Jul 4, 2022Updated 3 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 5 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆14Jun 1, 2023Updated 2 years ago
- The malsource dataset☆13Aug 31, 2021Updated 4 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 3 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 4 months ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 10 months ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆65Dec 21, 2022Updated 3 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- Living of the Land of Free SaaS☆69Mar 22, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Jul 29, 2022Updated 3 years ago
- ☆25Jul 12, 2023Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- a tiny program to consume from ETW providers for research☆55Jan 4, 2025Updated last year
- Windows Thingies in Python for live use.☆24Apr 22, 2019Updated 6 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extensible MacOS system telemetry generator.☆56Mar 1, 2026Updated last month
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- ☆12May 2, 2022Updated 3 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- python wrapper for the pastebin api☆23Jan 21, 2024Updated 2 years ago
- Static Obfuscar Deobfuscator☆22Aug 31, 2019Updated 6 years ago
- ☆13Jun 12, 2023Updated 2 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Ludus range for the Constructing Defense Lab☆117Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 months ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆93Feb 11, 2026Updated 2 months ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- ☆15Jul 28, 2024Updated last year
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago