NexusFuzzy / raccoon_configView external linksLinks
Scans a list of raccoon servers from Tria.ge and extracts the config
☆15Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for raccoon_config
Users that are interested in raccoon_config are comparing it to the libraries listed below
Sorting:
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 4 years ago
- Sources code extracted from malwares for analysis☆41Mar 10, 2023Updated 2 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Jul 25, 2019Updated 6 years ago
- ☆21May 8, 2022Updated 3 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆21Jan 5, 2025Updated last year
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 9 months ago
- Just some lists of Malware Configs☆173Jan 9, 2025Updated last year
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Feb 9, 2024Updated 2 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- ☆32May 9, 2021Updated 4 years ago