Lockbit, URSIF, BlackBasta etc.
☆224Oct 23, 2025Updated 4 months ago
Alternatives and similar repositories for Criminal-Leaks
Users that are interested in Criminal-Leaks are comparing it to the libraries listed below
Sorting:
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆67Oct 17, 2025Updated 5 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated last month
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆30Mar 27, 2025Updated 11 months ago
- insta-onion: Create a Tor Onion service in 20 seconds☆14Apr 12, 2020Updated 5 years ago
- Repo of the SQL database from the LockBit panel being hacked.☆32May 7, 2025Updated 10 months ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- A Mythic agent for Windows written in C☆162Mar 14, 2026Updated last week
- 参考taviso的代码逆向一下mpengine.dll☆20Jun 30, 2022Updated 3 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- 从admin冲到TrustedInstaller☆17Feb 3, 2023Updated 3 years ago
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆51Jan 16, 2026Updated 2 months ago
- ☆51Feb 21, 2025Updated last year
- ☆543Mar 11, 2026Updated last week
- Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentes☆31Aug 16, 2025Updated 7 months ago
- ☆384Mar 14, 2026Updated last week
- ☆12Jul 31, 2024Updated last year
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Aug 1, 2022Updated 3 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆512Aug 14, 2025Updated 7 months ago
- Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly…☆29Nov 19, 2023Updated 2 years ago
- ☆45Apr 27, 2024Updated last year
- ☆48Dec 28, 2025Updated 2 months ago
- ☆53Feb 4, 2025Updated last year
- [DEPRECIATED] All writeups are moved to my main website☆14Mar 15, 2024Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,330Nov 12, 2025Updated 4 months ago
- ☆59Oct 24, 2024Updated last year
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆49Feb 28, 2026Updated 3 weeks ago
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆23Sep 20, 2025Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- ☆34Updated this week
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆93Aug 3, 2025Updated 7 months ago