dannyroemhild / ransomware-fileext-listLinks
List with File Extensions used by Ransomware
☆36Updated last week
Alternatives and similar repositories for ransomware-fileext-list
Users that are interested in ransomware-fileext-list are comparing it to the libraries listed below
Sorting:
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 8 months ago
- ☆52Updated 3 months ago
- macOS Artifacts☆33Updated 8 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 9 months ago
- ☆22Updated 2 years ago
- Detection rule validation☆40Updated 2 years ago
- USN Journal full path builder☆62Updated last year
- Indicators of compromise☆15Updated last month
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆67Updated 2 years ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆29Updated 10 months ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆88Updated 9 months ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- Windows Forensics Salt States☆18Updated last week
- Documentation site for Velociraptor☆55Updated this week
- A tool for fetching DFIR and other GitHub tools.☆24Updated 3 months ago
- ☆96Updated 6 months ago
- Contains compiled binaries of Volatility☆37Updated 6 months ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆59Updated 5 months ago
- Script to automate Linux live evidence collection☆28Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Remote access and Antivirus Logging Database☆44Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- ☆67Updated 2 months ago
- Windows Forensics Environment Builder☆164Updated 2 months ago
- ☆68Updated 3 weeks ago
- ☆27Updated last month
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Updated 2 years ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆104Updated 3 years ago