Demonslay335 / stop_configLinks
Dump configuration from STOP Djvu ransomware sample
☆12Updated 5 years ago
Alternatives and similar repositories for stop_config
Users that are interested in stop_config are comparing it to the libraries listed below
Sorting:
- ☆35Updated 6 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆38Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆19Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- module for certexfil☆15Updated 3 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 9 months ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- A C# DLL to Dump LSA Secrets☆58Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆12Updated 4 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- ☆17Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Malicious DLL Generator in Py3☆26Updated 4 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago