Random tips and tricks RE: ransomware
☆14Aug 17, 2021Updated 4 years ago
Alternatives and similar repositories for ransomware_tips
Users that are interested in ransomware_tips are comparing it to the libraries listed below
Sorting:
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- ☆16Apr 12, 2018Updated 7 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated last week
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Labs and course material for Advania course 'PowerShell Advanced Fundamentals'☆12Jan 12, 2026Updated last month
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- ☆49Dec 11, 2025Updated 2 months ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- ☆43Apr 18, 2023Updated 2 years ago
- Paper editor tool☆10Sep 3, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- Huntress API☆11May 26, 2022Updated 3 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- ☆11Mar 14, 2021Updated 4 years ago
- Snake game written in PowerShell which uses any windows console (cmd.exe, powershell.exe, even VSCode) and draws out a custom native code…☆13Mar 25, 2025Updated 11 months ago
- Cyber Security Resources☆10Jan 25, 2024Updated 2 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago