Demonslay335 / stop_configLinks
Dump configuration from STOP Djvu ransomware sample
β12Updated 5 years ago
Alternatives and similar repositories for stop_config
Users that are interested in stop_config are comparing it to the libraries listed below
Sorting:
- π΅ ethereum grid trading botβ35Updated last week
- β20Updated 3 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.β56Updated 4 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFSβ43Updated 4 years ago
- β33Updated 11 months ago
- Malware campaigns and APTs research by BlackArrowβ19Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notesβ¦β43Updated 4 years ago
- Some ELF Malwaresβ10Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.β22Updated 3 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.β27Updated 3 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuffβ57Updated last month
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.β14Updated 5 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)β27Updated 3 years ago
- Python wrappers for mal_unpackβ37Updated 2 years ago
- xlrd2 is a variant of xlrd that is actively maintainedβ23Updated last year
- Dumping credentials through windbg and pykdβ41Updated 2 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malwareβ56Updated 2 months ago
- Recreating and reviewing the Windows persistence methodsβ39Updated 3 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.β12Updated 4 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.β30Updated 2 years ago
- Simple little rootkit made in Cβ13Updated 4 years ago
- β74Updated last year
- A set of tools for collecting forensic informationβ26Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanismsβ52Updated 4 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.β22Updated 3 years ago
- A collection of my presentation materials.β17Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementationβ12Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windowsβ53Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"β12Updated 5 years ago
- Source Code of MSIL Ransomβ14Updated 2 years ago