Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.
☆13Nov 10, 2023Updated 2 years ago
Alternatives and similar repositories for HuntRisePro
Users that are interested in HuntRisePro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- ☆34Updated this week
- ☆14Sep 22, 2023Updated 2 years ago
- ☆11Dec 8, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- My public findings/reports from decentralized audits, select bug bounty programs and engagements☆13Apr 22, 2026Updated last week
- InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts!☆16May 31, 2022Updated 3 years ago
- Deepwood- is an easy-to-use, Python-based RAT & Stealer, which send info to your webhook. You can recover passwords, aplication data, dis…☆15May 20, 2024Updated last year
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆16Sep 8, 2024Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- Ransomware groups posts☆44Updated this week
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆19Sep 22, 2023Updated 2 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 10 months ago
- a lightweight and simple cli package☆12Nov 22, 2021Updated 4 years ago
- 🔥 [ NEW ] 🔥 A Powerfull Token Stealer! Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer et…☆24Jun 27, 2024Updated last year
- Stealing session (Steam, Telegram, Epicgames, ProtonVPN, Metamask) files from PC using Powershell, POC☆14Aug 11, 2023Updated 2 years ago
- Extended Bitcoin Clipper from Nyan Cat☆34Aug 15, 2020Updated 5 years ago
- A powerful tool designed to harvest and collect a wide range of windows system data for forensics.☆17Apr 27, 2026Updated last week
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- ☆32Nov 4, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This project will determine which of the five supervised classification machine learning algorithms performs best in detecting phishy ema…☆48Oct 30, 2023Updated 2 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆107Jul 31, 2023Updated 2 years ago
- Excel to json so easily, read from local source or remote source☆15Aug 31, 2021Updated 4 years ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆108Mar 12, 2026Updated last month
- Apple Baseband Sourcecode☆29Sep 30, 2018Updated 7 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Higher level abstraction for franz-go.☆22Aug 22, 2022Updated 3 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago