struppigel / STOP-DJVU-Ransomware-VaccineLinks
Vaccine for STOP/DJVU ransomware, prevents encryption
☆26Updated 3 years ago
Alternatives and similar repositories for STOP-DJVU-Ransomware-Vaccine
Users that are interested in STOP-DJVU-Ransomware-Vaccine are comparing it to the libraries listed below
Sorting:
- ☆27Updated 6 months ago
- ☆66Updated 2 years ago
- Python wrappers for mal_unpack☆36Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- General malware analysis stuff☆37Updated 9 months ago
- ☆14Updated 2 years ago
- Collaborative malware exchange repository.☆34Updated 7 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 6 months ago
- Collection of my own detection rules☆20Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Collection of generic YARA rules☆16Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆34Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- ☆30Updated 7 months ago
- Muteces (mutexes/mutants) used by various malware families☆22Updated 7 months ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 2 years ago
- Yara rules☆21Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- ☆28Updated 4 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago