struppigel / STOP-DJVU-Ransomware-Vaccine
Vaccine for STOP/DJVU ransomware, prevents encryption
☆23Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for STOP-DJVU-Ransomware-Vaccine
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Python wrappers for mal_unpack☆34Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- ☆64Updated last year
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆25Updated 3 months ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Collection of YARA rules designed for usage through VirusTotal.com.☆65Updated 7 months ago
- ☆15Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Imphash-like calculation on Golang binaries☆47Updated 2 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆23Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ☆31Updated 3 years ago
- My Malware Analysis Reports☆18Updated 2 years ago
- ☆22Updated 2 years ago
- Collection of generic YARA rules☆14Updated 4 months ago
- A small util to brute-force prefetch hashes☆73Updated 2 years ago
- Configuration Extractors for Malware☆53Updated 3 weeks ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated last year
- A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.☆13Updated 3 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Updated 7 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆22Updated 7 months ago
- VirusTotal Intelligence Search☆35Updated 4 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆39Updated 3 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆30Updated 2 years ago