bobby-tablez / Windows-Sandbox-Flare-VMLinks
This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.
☆11Updated last year
Alternatives and similar repositories for Windows-Sandbox-Flare-VM
Users that are interested in Windows-Sandbox-Flare-VM are comparing it to the libraries listed below
Sorting:
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆38Updated 9 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Updated last year
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- ☆20Updated 3 years ago
- ASR Configurator, Essentials and Atomic Testing☆100Updated 9 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆75Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Hunt for SQLite files used by various applications☆27Updated this week
- ☆29Updated 3 years ago
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆91Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆86Updated 5 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Updated 5 months ago
- ☆67Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Updated 7 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆116Updated 5 months ago
- ☆74Updated last week
- Monitor your PingCastle scans to highlight the rule diff between two scans☆155Updated last month
- AppLocker Policy Generator☆25Updated 5 months ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- A collection of tools, scripts and personal research☆154Updated last month
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆167Updated 9 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- All kinds of tiny shells☆65Updated 2 years ago
- ☆53Updated 3 months ago