Demonslay335 / stop_config
Dump configuration from STOP Djvu ransomware sample
☆11Updated 4 years ago
Alternatives and similar repositories for stop_config:
Users that are interested in stop_config are comparing it to the libraries listed below
- ☆35Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 6 years ago
- A collection of tools for debugging Windows application crashes.☆9Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- ☆12Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Password spraying toolkit☆7Updated 4 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 6 years ago
- ☆43Updated 5 years ago
- ☆16Updated last year
- Windows Process Injection Toolkit - plain and simple :)☆26Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- ☆17Updated 3 years ago
- ☆22Updated 4 years ago