Kracken256 / dash-shell-rootkit
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
☆9Updated last year
Alternatives and similar repositories for dash-shell-rootkit:
Users that are interested in dash-shell-rootkit are comparing it to the libraries listed below
- ☆17Updated 4 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- My Malware Analysis Reports☆19Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated 6 months ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- ☆34Updated 2 years ago
- ☆19Updated 3 years ago
- ☆51Updated last month
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Reversed source code to the Babuk ransomware builder.☆15Updated 3 years ago
- ☆14Updated 2 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆32Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- Configuration Extractors for Malware☆55Updated 2 weeks ago
- Hellokitty Ransomware Source Code☆15Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- ☆26Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆39Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- ☆13Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- PoC-Malware-TTPs☆49Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆14Updated last year