arosenmund / defcon32_dissecting_defeating_ransomwares_evasion
Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32
☆11Updated 6 months ago
Alternatives and similar repositories for defcon32_dissecting_defeating_ransomwares_evasion:
Users that are interested in defcon32_dissecting_defeating_ransomwares_evasion are comparing it to the libraries listed below
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- Find potential DLL Sideloads on your windows computer☆176Updated last month
- Active C&C Detector☆152Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 8 months ago
- ☆36Updated 11 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 4 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 6 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆50Updated last month
- ☆80Updated 3 months ago
- Retired TrustedSec Capabilities☆246Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 5 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 4 months ago
- ☆138Updated 6 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 9 months ago
- A collection of tools, scripts and personal research☆125Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 9 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆126Updated last week
- A collection of CVEs weaponized by ransomware operators☆104Updated 2 months ago
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- DFIR project to collect and analyze events in Google Workspace☆12Updated 10 months ago
- https://lolad-project.github.io/☆71Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.☆75Updated last year