This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in the leak and posted on may 10th, 2021 in the channel.
☆87Mar 3, 2022Updated 4 years ago
Alternatives and similar repositories for conti_202202_leak_procedures
Users that are interested in conti_202202_leak_procedures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Mar 2, 2022Updated 4 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- ☆21May 8, 2022Updated 3 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 5 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆128May 25, 2021Updated 4 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 2 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆791Oct 29, 2022Updated 3 years ago
- Carve file metadata from NTFS index ($I30) attributes☆71Feb 3, 2024Updated 2 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- ☆13Mar 27, 2021Updated 5 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 7 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- This repo is where I store my Threat Hunting ideas/content☆89Mar 20, 2026Updated last week
- ☆27Jul 11, 2022Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago