rj-chap / ransomware_tipsView external linksLinks
Random tips and tricks RE: ransomware
☆14Aug 17, 2021Updated 4 years ago
Alternatives and similar repositories for ransomware_tips
Users that are interested in ransomware_tips are comparing it to the libraries listed below
Sorting:
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆13Mar 4, 2019Updated 6 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- ☆16Apr 12, 2018Updated 7 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Labs and course material for Advania course 'PowerShell Advanced Fundamentals'☆11Jan 12, 2026Updated last month
- Software Exploitation☆11Sep 22, 2025Updated 4 months ago
- MISP to Microsoft Defender integration☆16Feb 6, 2026Updated last week
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- ☆43Apr 18, 2023Updated 2 years ago
- ☆49Dec 11, 2025Updated 2 months ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- NYU's Introduction to Deep Learning Research☆39Updated this week
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Cyber Security Resources☆10Jan 25, 2024Updated 2 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆12Jun 6, 2024Updated last year
- A detailed list of potentially dangerous file extensions☆17Jun 18, 2025Updated 7 months ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- ☆11Mar 14, 2021Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Paper editor tool☆10Sep 3, 2023Updated 2 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated 11 months ago
- a jax benchmark for ad hoc teamwork☆17Feb 5, 2026Updated last week
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- One command to update all your repos☆10Feb 24, 2024Updated last year
- ☆12Feb 8, 2023Updated 3 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Huntress API☆11May 26, 2022Updated 3 years ago
- ☆16Oct 31, 2025Updated 3 months ago