This repository provides tools to fight against Emotet malware. You can protect your system using these tools
☆23Jan 24, 2020Updated 6 years ago
Alternatives and similar repositories for emotet_protection_tools
Users that are interested in emotet_protection_tools are comparing it to the libraries listed below
Sorting:
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- ☆83Jan 31, 2020Updated 6 years ago
- Test a host for susceptibility to CVE-2019-19781☆109Oct 23, 2020Updated 5 years ago
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- System Processes Correlation Engine☆19Jan 2, 2024Updated 2 years ago
- Splunk TA for sending completion requests to ChatGPT☆27May 18, 2024Updated last year
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Jan 15, 2020Updated 6 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- A decryptor for systems infected by Avaddon ransomware.☆25Oct 29, 2024Updated last year
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Operation Wocao - Indicators of Compromise☆30Dec 19, 2019Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆27Nov 7, 2019Updated 6 years ago
- ☆28Jul 5, 2025Updated 8 months ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- ☆39Feb 12, 2020Updated 6 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Satisfactory game mod that adds functional gates for building interactive automated systems☆14Feb 10, 2026Updated 3 weeks ago
- Signature engine for all your logs☆172Nov 13, 2023Updated 2 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- python text steganography library☆11Nov 29, 2022Updated 3 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Multi-algo CPUMiner☆13Apr 2, 2016Updated 9 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- ☆10Jan 2, 2016Updated 10 years ago