A canary designed to minimize the impact from certain Ransomware actors
☆102Mar 3, 2021Updated 5 years ago
Alternatives and similar repositories for KilledProcessCanary
Users that are interested in KilledProcessCanary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- ☆102Oct 14, 2024Updated last year
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆19Jan 31, 2025Updated last year
- ☆21Aug 31, 2022Updated 3 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- ☆262Apr 10, 2023Updated 3 years ago
- ☆27Feb 3, 2026Updated 2 months ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- ☆14Jan 8, 2026Updated 3 months ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Linux x86_64 Process Injection Utility☆59Mar 9, 2021Updated 5 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆515Jul 15, 2022Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Run Rubeus via Rundll32☆209Apr 25, 2020Updated 5 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- ☆451Aug 4, 2021Updated 4 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Allow a Go process to dynamically load .NET assemblies☆150Mar 28, 2020Updated 6 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago