kinomakino / ransomware_file_extensionsLinks
Popular Ransomware file extensions
☆26Updated last year
Alternatives and similar repositories for ransomware_file_extensions
Users that are interested in ransomware_file_extensions are comparing it to the libraries listed below
Sorting:
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆134Updated 9 years ago
- thethe☆116Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- ATTPwn☆214Updated last year
- Simulating Adversary Operations☆93Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆85Updated 2 years ago
- Snort_rules detection bad actors.☆28Updated 11 months ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Linux Incident Response☆90Updated 5 years ago
- ☆169Updated 5 years ago
- Tools for DFIR☆120Updated 7 years ago
- ☆22Updated 8 years ago
- Actualización de Huron, distro Linux para Osint☆19Updated 5 years ago
- Carbon Black Response IR tool☆54Updated 4 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- ☆92Updated 3 years ago
- Hunt malware with Volatility☆47Updated last week
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆84Updated 6 years ago
- ☆77Updated 6 years ago
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆34Updated 8 years ago
- Learning volatility plugins.☆19Updated 4 years ago
- Tools from WFA 4/e, timeline tools, etc.☆141Updated last year
- Manipulate timestamps on NTFS☆51Updated 10 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Automagically extract forensic timeline from volatile memory dump☆131Updated last year
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆214Updated 6 years ago