IcedID Decryption Tool
☆28May 7, 2021Updated 4 years ago
Alternatives and similar repositories for IcedDecrypt
Users that are interested in IcedDecrypt are comparing it to the libraries listed below
Sorting:
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆15Oct 3, 2024Updated last year
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Updated this week
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- ☆18Mar 26, 2024Updated last year
- ☆13Oct 21, 2022Updated 3 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- ☆10Nov 11, 2016Updated 9 years ago
- ☆33Jun 12, 2024Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆110Jan 26, 2021Updated 5 years ago
- ☆76Jun 5, 2018Updated 7 years ago
- ☆31Nov 28, 2023Updated 2 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- Disguise your MAC Address as that of any manufacturer as you want.☆10Jan 6, 2021Updated 5 years ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- My collection of self-written exploits☆24Mar 25, 2022Updated 3 years ago
- ☆28Jan 22, 2025Updated last year
- ☆10Sep 11, 2021Updated 4 years ago
- ☆540Mar 14, 2026Updated last week
- ☆37Sep 30, 2021Updated 4 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Oct 4, 2022Updated 3 years ago
- patch of OpenWrt source to build firmware for the Xiaomi Mi Router 4A Gigabit V2 (RB02/R4AV2)☆13Apr 29, 2023Updated 2 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- ☆1,133Dec 19, 2023Updated 2 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago