reecdeep / HiveV5_file_decryptor
Hive v5 file decryption algorithm
☆34Updated 2 years ago
Alternatives and similar repositories for HiveV5_file_decryptor:
Users that are interested in HiveV5_file_decryptor are comparing it to the libraries listed below
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆32Updated 2 years ago
- ☆22Updated last year
- Linux Baseline and Forensic Triage Tool - BETA☆53Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Lazarus analysis tools and research report☆55Updated last year
- ⚠️ Malware Development training ⚠️☆30Updated 3 weeks ago
- Detection rule validation☆41Updated last year
- Yara Rules for Modern Malware☆73Updated last year
- ☆37Updated 11 months ago
- ☆66Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated 2 weeks ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 9 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 5 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- ☆80Updated 4 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- ☆25Updated 3 months ago
- Contains compiled binaries of Volatility☆33Updated last month
- Configuration Extractors for Malware☆92Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 3 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year