Unit221B / Russian
Russian Keyboard Registry Script
☆104Updated 3 years ago
Alternatives and similar repositories for Russian:
Users that are interested in Russian are comparing it to the libraries listed below
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 6 months ago
- This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or …☆260Updated 5 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- A Passive SSH back-end and scanner.☆103Updated 7 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- ☆149Updated last week
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆123Updated 2 years ago
- Collection of useful Canary tools☆75Updated last month
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- ☆99Updated 4 years ago
- A browser extension and API server for detecting corporate password use on external websites☆91Updated last month
- A list of my personal projects☆173Updated 2 years ago
- ☆159Updated last year
- RPZ Zone Files to Block DNS-over-HTTPS☆87Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆271Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- Files vetted, and approved for public release☆53Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- ☆73Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆298Updated 2 months ago
- Threathunt details for the Solarwinds compromise☆33Updated 3 years ago
- ☆77Updated 2 years ago
- log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)☆36Updated 3 years ago
- Open source solution to check prospective AD passwords against previously breached passwords☆84Updated 6 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆254Updated this week
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 2 months ago
- ☆116Updated last year