bobby-tablez / Windows-Sandbox-Flare-VMLinks
This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.
☆11Updated 11 months ago
Alternatives and similar repositories for Windows-Sandbox-Flare-VM
Users that are interested in Windows-Sandbox-Flare-VM are comparing it to the libraries listed below
Sorting:
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆74Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆37Updated 8 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Updated 2 months ago
- ☆20Updated 3 years ago
- ASR Configurator, Essentials and Atomic Testing☆98Updated 8 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 8 months ago
- ☆67Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- ☆74Updated 2 weeks ago
- A collection of tools, scripts and personal research☆154Updated 3 weeks ago
- AppLocker Policy Generator☆25Updated 4 months ago
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆91Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Updated 6 months ago
- ☆28Updated 2 years ago
- God Mode Detection Rules☆134Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated 4 months ago
- Hunt for SQLite files used by various applications☆27Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 6 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- ☆49Updated 10 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆154Updated 3 weeks ago
- ☆53Updated 2 months ago
- ☆61Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆86Updated 4 months ago