NexusFuzzy / AzoDecrypt
Script which is able to decrypt data sent to AzoRult 3.3 Server
☆11Updated 4 years ago
Alternatives and similar repositories for AzoDecrypt:
Users that are interested in AzoDecrypt are comparing it to the libraries listed below
- ☆22Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- ☆23Updated 4 years ago
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated 3 weeks ago
- ☆24Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- ☆11Updated 6 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- A Maltego transform for VirusTotal Submitter Information☆32Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- HoneyDB Python Module☆13Updated last year
- Various snippets created during malware analysis☆22Updated 6 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- ☆10Updated 4 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- C# User Simulation☆32Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago