MinervaLabsResearch / BlogPostsLinks
Code examples from recent blog posts by minerva labs.
☆45Updated 6 years ago
Alternatives and similar repositories for BlogPosts
Users that are interested in BlogPosts are comparing it to the libraries listed below
Sorting:
- ☆59Updated 6 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- All the Power with no Shell☆36Updated 3 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- An ARP Poisoning Defender script☆43Updated 7 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- ☆50Updated 7 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 8 years ago
- This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.☆77Updated 2 years ago
- ☆58Updated 7 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆140Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago