hjunker / ProcessBouncerLinks
ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows to effectively block most of current ransomware that is out there.
☆25Updated 4 years ago
Alternatives and similar repositories for ProcessBouncer
Users that are interested in ProcessBouncer are comparing it to the libraries listed below
Sorting:
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- A Darktrace CLI written in Python☆16Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- ☆35Updated 4 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Updated 8 years ago
- ☆39Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Short little AV Test to check Detection Rates☆20Updated 5 years ago
- PowerShell version of Fail2Ban☆13Updated 6 years ago
- OSSEM Modular☆27Updated 5 years ago
- ☆22Updated 5 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 3 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Collect hashes password hashes for cracking☆32Updated 12 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- Windows Security Logging☆43Updated 3 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated 2 years ago