This repository provides tools to fight against Emotet malware. You can protect your system using these tools
☆24Jan 24, 2020Updated 6 years ago
Alternatives and similar repositories for emotet_protection_tools
Users that are interested in emotet_protection_tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆83Jan 31, 2020Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- System Processes Correlation Engine☆19Jan 2, 2024Updated 2 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- A decryptor for systems infected by Avaddon ransomware.☆25Oct 29, 2024Updated last year
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- ☆24Apr 10, 2024Updated last year
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- ida python scripts☆23Jul 23, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 9 years ago
- Papers and Presentations from the DFRWS Conferences☆20Jul 12, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆119Jan 15, 2020Updated 6 years ago
- Notes about kubernetes☆12Nov 18, 2022Updated 3 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Collection of various files from infected hosts☆77Mar 22, 2022Updated 4 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago