eddiechu-zz / Encrypt-Delete-TestLinks
Really can protect from ransomware encryption?
☆15Updated 3 years ago
Alternatives and similar repositories for Encrypt-Delete-Test
Users that are interested in Encrypt-Delete-Test are comparing it to the libraries listed below
Sorting:
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated last year
- Keep it secret, keep it safe☆78Updated 8 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- A powershell parser for https://github.com/ufrisk/MemProcFS☆43Updated 4 years ago
- Indicators of Normality☆11Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 9 months ago
- ☆35Updated 3 years ago
- Identifies metadata of .NET binary files.☆21Updated last year
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- Symantec EDR Internals☆28Updated 4 years ago
- ☆23Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 3 years ago
- volatility explorer☆92Updated 4 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆16Updated 2 years ago
- This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any …☆25Updated 4 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Open YARA scan- and search engine☆24Updated 7 months ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated last month
- ☆18Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆25Updated 3 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆30Updated 7 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Updated 3 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year