kinomakino / ransomware_file_extensionsLinks
Popular Ransomware file extensions
☆26Updated last year
Alternatives and similar repositories for ransomware_file_extensions
Users that are interested in ransomware_file_extensions are comparing it to the libraries listed below
Sorting:
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- Tools for DFIR☆120Updated 7 years ago
- thethe☆116Updated 5 years ago
- Automagically extract forensic timeline from volatile memory dump☆131Updated last year
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆136Updated 9 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- Defence Against the Dark Arts☆34Updated 6 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆93Updated 2 years ago
- Linux Incident Response☆90Updated 6 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆220Updated 7 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Fast incident overview☆41Updated 8 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- Hunt malware with Volatility☆47Updated 6 months ago
- Submits multiple domains to VirusTotal API☆58Updated 4 years ago
- CyberChef update scripts in PowerShell & Bash☆17Updated last year
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆87Updated 6 years ago
- ☆39Updated 5 years ago
- ☆106Updated 4 years ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- ☆25Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- Tools from WFA 4/e, timeline tools, etc.☆144Updated last year
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Python script to batch query the Tor Relays and Bridges☆37Updated 6 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- Smb Scanner from PingCastle☆125Updated 6 years ago