knez / defender-dumpLinks
Dump quarantined files from Windows Defender
☆73Updated 3 years ago
Alternatives and similar repositories for defender-dump
Users that are interested in defender-dump are comparing it to the libraries listed below
Sorting:
- RegRipper4.0☆81Updated 2 months ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆77Updated last month
- Rules shared by the community from 100 Days of YARA 2024☆89Updated last year
- Repository of Yara Rules☆139Updated 3 weeks ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆38Updated 3 years ago
- Powershell Linter☆87Updated this week
- ☆113Updated 5 months ago
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- ☆250Updated 8 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆64Updated last year
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Elastic Security Labs releases☆84Updated 2 months ago
- ☆21Updated 3 years ago
- A specification and style guide for YARA rules☆66Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Volatility 3 Plugins☆21Updated 3 years ago
- ☆214Updated 2 months ago
- A guide on how to write fast and memory friendly YARA rules☆164Updated last year
- JPCERT/CC public YARA rules repository☆110Updated 2 months ago
- A Windows Event Log MCP☆39Updated 5 months ago
- Yara Rules for Modern Malware☆78Updated last year
- YARA rule analyzer to improve rule quality and performance☆111Updated 3 weeks ago
- Windows symbol tables for Volatility 3☆92Updated last year
- Configuration Extractors for Malware☆123Updated 9 months ago
- ☆260Updated last year
- Recycle bin artifact parser☆59Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- A collection of my yara rules☆34Updated 2 years ago
- Carve file metadata from NTFS index ($I30) attributes☆71Updated 2 years ago