bobby-tablez / Windows-Sandbox-Flare-VMLinks
This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.
☆11Updated 10 months ago
Alternatives and similar repositories for Windows-Sandbox-Flare-VM
Users that are interested in Windows-Sandbox-Flare-VM are comparing it to the libraries listed below
Sorting:
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆35Updated 7 months ago
- MS Graph Commands and Tools for Blue Teamers☆51Updated 2 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 6 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆72Updated last year
- ASR Configurator, Essentials and Atomic Testing☆99Updated 7 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 4 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- ☆20Updated 3 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Updated 3 weeks ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 11 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆91Updated 9 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆153Updated last month
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆117Updated 3 months ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Updated 5 months ago
- DEFCON 31 slide deck and video link☆65Updated 5 months ago
- A collection of tools, scripts and personal research☆146Updated 3 months ago
- Evtx Log (xml) Browser☆55Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 11 months ago
- ☆109Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆99Updated 3 months ago
- AppLocker Policy Generator☆24Updated 2 months ago
- VirtualGHOST Detection Tool☆96Updated last year
- ☆74Updated this week
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- ☆61Updated 2 years ago
- ☆27Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 2 months ago
- ☆67Updated 2 years ago