Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.
☆23Mar 20, 2019Updated 7 years ago
Alternatives and similar repositories for APT38-DYEPACK
Users that are interested in APT38-DYEPACK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Jul 19, 2020Updated 5 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆25Sep 4, 2017Updated 8 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 7 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Jan 18, 2022Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- exp for CVE-2019-0887☆18Jan 15, 2021Updated 5 years ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 3 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- a open source rat from china☆27Oct 28, 2016Updated 9 years ago
- POC for CVE-2019-14339 Canon PRINT 2.5.5☆14Sep 15, 2019Updated 6 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆39Jan 24, 2020Updated 6 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- This program encodes text in a bitmap image (.bmp). It works by using LSB steganography which is the process of modifying the least sign…☆11Jan 13, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- carbanak\group_ib_smart_boys☆11Jul 12, 2018Updated 7 years ago
- ☆11Apr 17, 2017Updated 9 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- 瞎写的一点小脚本小工具什么的☆24Dec 6, 2021Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 5 years ago
- Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)☆14Mar 11, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆69Feb 3, 2020Updated 6 years ago
- https://github.com/jakejarvis/awesome-shodan-queries☆19Jan 20, 2021Updated 5 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Android kernel source tree for OnePlus msm8996 devices☆10Nov 24, 2017Updated 8 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Python code to extract chrome cookie, history and login data files☆59Oct 29, 2017Updated 8 years ago