hjunker / ProcessBouncerLinks
ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows to effectively block most of current ransomware that is out there.
☆24Updated 4 years ago
Alternatives and similar repositories for ProcessBouncer
Users that are interested in ProcessBouncer are comparing it to the libraries listed below
Sorting:
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆29Updated 8 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- ☆39Updated 5 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Updated 8 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- ☆35Updated 3 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆25Updated 8 years ago
- Short little AV Test to check Detection Rates☆22Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 9 months ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- ☆22Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago