hjunker / ProcessBouncerLinks
ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows to effectively block most of current ransomware that is out there.
☆24Updated 4 years ago
Alternatives and similar repositories for ProcessBouncer
Users that are interested in ProcessBouncer are comparing it to the libraries listed below
Sorting:
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- PowerShell version of Fail2Ban☆12Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 11 months ago
- ☆39Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Updated 8 years ago
- ☆35Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- HoneyDB Python Module☆14Updated last year
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- ☆22Updated 4 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- ☆12Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year