Script which is able to decrypt data sent to AzoRult 3.3 Server
☆11Feb 5, 2021Updated 5 years ago
Alternatives and similar repositories for AzoDecrypt
Users that are interested in AzoDecrypt are comparing it to the libraries listed below
Sorting:
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Qiwi API C# Desktop Manager☆11Dec 8, 2022Updated 3 years ago
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 6 months ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- ☆31May 10, 2016Updated 9 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- A docker image for the Gophish web application☆18Jul 10, 2019Updated 6 years ago
- ☆83Jan 31, 2020Updated 6 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 9 years ago
- Random Scripts and Tools☆14Mar 29, 2022Updated 3 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- Python implementation of LZNT1 compression/decompression☆70Mar 16, 2020Updated 6 years ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- Indexed search and clustering tool for digital forensics☆26Nov 5, 2014Updated 11 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 3 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Not Another Code Injection Toolkit☆16Aug 19, 2021Updated 4 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 6 months ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- Browser and apps data stealer☆24Jan 1, 2024Updated 2 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- The Outlook HTML Leak Test Project☆130May 12, 2018Updated 7 years ago
- IDA script for vmprotect Windows Api address decoder☆54Jun 8, 2021Updated 4 years ago
- ☆10Nov 17, 2018Updated 7 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- A DFIR tool to collect artifacts on macOS☆56Mar 1, 2020Updated 6 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- A demonstration of domain generation algorithm (DGA) and determing regular expression and yara rule for each dga.☆16Sep 4, 2024Updated last year
- Android privilege escalation via an use-after-free in binder.c☆41Apr 14, 2020Updated 5 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- ☆34Apr 10, 2023Updated 2 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago