dannyroemhild / ransomware-fileext-listLinks
List with File Extensions used by Ransomware
☆36Updated last week
Alternatives and similar repositories for ransomware-fileext-list
Users that are interested in ransomware-fileext-list are comparing it to the libraries listed below
Sorting:
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 11 months ago
- ☆52Updated 5 months ago
- ☆22Updated 3 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- Contains compiled binaries of Volatility☆37Updated 8 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Updated 11 months ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆29Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Updated 10 months ago
- Documentation site for Velociraptor☆59Updated this week
- Detection rule validation☆40Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- USN Journal full path builder☆65Updated last year
- ☆28Updated 3 months ago
- my MSTICpy practice and custom tools repository☆11Updated 9 months ago
- macOS Artifacts☆33Updated 11 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- Jupyter Notebooks for the Blue Team☆39Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- A series of python scripts to extract information from Dark Web Applications☆13Updated 10 months ago
- ☆65Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 3 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Updated 2 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- Script to automate Linux live evidence collection☆28Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Turn any blog into structured threat intelligence.☆51Updated this week
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Updated 2 years ago