EyupErgin / HuntRiseProLinks
Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.
☆11Updated last year
Alternatives and similar repositories for HuntRisePro
Users that are interested in HuntRisePro are comparing it to the libraries listed below
Sorting:
- ☆24Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆31Updated this week
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Trojan written in C++ for Windows☆18Updated last year
- Python, C++ and Go☆22Updated 2 years ago
- Ransomware for demonstration☆17Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 3 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆9Updated 4 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Script to chain search parameters for MalwareBazaar☆12Updated 5 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆42Updated 2 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- ☆9Updated 2 years ago
- Automated Payload Test Controller☆10Updated 8 years ago