hjunker / ProcessBouncerLinks
ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows to effectively block most of current ransomware that is out there.
☆24Updated 4 years ago
Alternatives and similar repositories for ProcessBouncer
Users that are interested in ProcessBouncer are comparing it to the libraries listed below
Sorting:
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- ☆35Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- ☆22Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- ☆12Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- ☆39Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Incident Response Network Tools☆24Updated 4 years ago