ion-storm / emotet-malware-killerView external linksLinks
☆39Feb 12, 2020Updated 6 years ago
Alternatives and similar repositories for emotet-malware-killer
Users that are interested in emotet-malware-killer are comparing it to the libraries listed below
Sorting:
- incident response scripts☆18Mar 4, 2019Updated 6 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 3 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- ☆17Aug 24, 2020Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- ☆16Feb 26, 2018Updated 7 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 2 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Utilities for Sysmon☆1,569Sep 21, 2025Updated 4 months ago
- ☆49Jan 13, 2020Updated 6 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- A repository for word lists I've generated☆35Dec 31, 2025Updated last month
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- A tool to help malware analysts signature unique parts of RTF documents☆29Jan 5, 2026Updated last month
- Esercizi svolti dai membri della community: Python Group Biella!☆13Jul 9, 2024Updated last year
- ☆10Sep 11, 2021Updated 4 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 6 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆433Feb 4, 2021Updated 5 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆818Nov 5, 2023Updated 2 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- tools for analyzing strings from password lists☆58Aug 15, 2022Updated 3 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 2 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago