649 / APT38-DYEPACK
Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.
☆23Updated 6 years ago
Alternatives and similar repositories for APT38-DYEPACK
Users that are interested in APT38-DYEPACK are comparing it to the libraries listed below
Sorting:
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆39Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 6 years ago
- ☆24Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- ☆43Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ☆16Updated 10 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Copy of Subtee's Repository That's Taken Down☆23Updated 7 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- Methods of C2☆21Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Work in Progress repo☆14Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 8 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆18Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago