struppigel / STOP-DJVU-Ransomware-Vaccine
Vaccine for STOP/DJVU ransomware, prevents encryption
☆23Updated 3 years ago
Alternatives and similar repositories for STOP-DJVU-Ransomware-Vaccine:
Users that are interested in STOP-DJVU-Ransomware-Vaccine are comparing it to the libraries listed below
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆32Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆59Updated last month
- Python wrappers for mal_unpack☆35Updated last year
- ☆33Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Collaborative malware exchange repository.☆33Updated 2 months ago
- ☆34Updated 2 years ago
- ☆15Updated 3 years ago
- ☆68Updated last year
- Collection of my own detection rules☆14Updated 11 months ago
- ☆63Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆29Updated last year
- ☆25Updated 2 months ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆24Updated 2 years ago
- Evtx Log (xml) Browser☆56Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated 9 months ago
- Batch script to compile a binary shellcode blob into an exe file☆83Updated 5 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 3 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆26Updated 6 months ago
- ☆42Updated last month
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- ☆22Updated 8 months ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Updated 3 years ago
- ☆19Updated 3 years ago