Demonslay335 / stop_config
Dump configuration from STOP Djvu ransomware sample
☆12Updated 5 years ago
Alternatives and similar repositories for stop_config:
Users that are interested in stop_config are comparing it to the libraries listed below
- ☆35Updated 6 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Some ELF Malwares☆9Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- ☆12Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- A collection of my presentation materials.☆17Updated 11 months ago
- Host IDS for desktop users☆11Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆17Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Work in Progress repo☆14Updated 6 years ago