A collection of tools for dealing with TrickBot
☆203Nov 11, 2017Updated 8 years ago
Alternatives and similar repositories for TrickBot-Toolkit
Users that are interested in TrickBot-Toolkit are comparing it to the libraries listed below
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Various snippets created during malware analysis☆463Oct 3, 2025Updated 4 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆536Jun 5, 2022Updated 3 years ago
- EternalRocks worm☆467May 25, 2017Updated 8 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Page File analysis tools.☆131Dec 3, 2015Updated 10 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Nov 21, 2016Updated 9 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Jan 15, 2020Updated 6 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago