Demonslay335 / stop_configLinks
Dump configuration from STOP Djvu ransomware sample
☆12Updated 5 years ago
Alternatives and similar repositories for stop_config
Users that are interested in stop_config are comparing it to the libraries listed below
Sorting:
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- ☆35Updated 6 years ago
- ☆12Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- ☆14Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- ☆12Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Custom pentesting tools☆25Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Malicious DLL Generator in Py3☆26Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- A collection of my presentation materials.☆17Updated last year
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- Undetectable Windows Payload Generation☆10Updated 7 years ago