☆39Feb 12, 2020Updated 6 years ago
Alternatives and similar repositories for emotet-malware-killer
Users that are interested in emotet-malware-killer are comparing it to the libraries listed below
Sorting:
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- python reverse shell with gmail☆16Aug 9, 2024Updated last year
- ☆13Feb 6, 2018Updated 8 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- ☆17Aug 24, 2020Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- ☆16Feb 26, 2018Updated 8 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 7 months ago
- Utilities for Sysmon☆1,573Sep 21, 2025Updated 5 months ago
- Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.☆46Jan 5, 2020Updated 6 years ago
- Capture-Py is a malware analysis tool that makes a copy of any files deleted or modified in a given directory and sub-directories. It was…☆27Jun 28, 2017Updated 8 years ago
- ☆49Jan 13, 2020Updated 6 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- A repository for word lists I've generated☆35Dec 31, 2025Updated 2 months ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Esercizi svolti dai membri della community: Python Group Biella!☆13Jul 9, 2024Updated last year
- PowerShell script for deobfuscating encoded PowerShell scripts☆434Feb 4, 2021Updated 5 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆822Nov 5, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 3 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Sep 9, 2022Updated 3 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆80Jan 2, 2022Updated 4 years ago
- C++ malware specifically built to extract Discord authentication tokens and personally identifying information.☆28Mar 24, 2022Updated 3 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago