This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as mid-2022, The attack chain starts with backdoor which is a DLL targets both 32-bit and 64-bit Windows
☆11Jun 19, 2024Updated last year
Alternatives and similar repositories for Voodoo-Bear-APT
Users that are interested in Voodoo-Bear-APT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 26, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆31Aug 13, 2025Updated 9 months ago
- ☆11Aug 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆15Sep 16, 2024Updated last year
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆66May 10, 2026Updated last week
- Fine-tune BERT models to classify Arabic text by different dialects.☆19Aug 8, 2023Updated 2 years ago
- Windows Privilege Escalation☆24Jun 7, 2022Updated 3 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆49Aug 30, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- DFIR project to collect and analyze events in Google Workspace☆14Apr 12, 2024Updated 2 years ago
- Simple netexec wraper with html repport☆19May 19, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Payload Generation Workflow☆41Jul 18, 2025Updated 10 months ago
- ☆29May 10, 2024Updated 2 years ago
- ☆50Dec 5, 2025Updated 5 months ago
- ☆10Aug 18, 2025Updated 9 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- ☆75Jun 17, 2025Updated 11 months ago
- Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs r …☆143Apr 15, 2026Updated last month
- ☆25Feb 18, 2025Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆24May 13, 2023Updated 3 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- An offensive toolkit for restless guests #DEFCON33☆59Aug 11, 2025Updated 9 months ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆51Updated this week
- Execute shellcode via ASPNET compiler☆61Oct 2, 2025Updated 7 months ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆47Jun 12, 2024Updated last year
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆51Feb 23, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆29May 25, 2021Updated 4 years ago
- Python Exploitation Framework, V8 Engine Debugger, Proxy interceptor, marketplace, post-exploitation, backdoor generator,....☆48Updated this week
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Apr 17, 2026Updated last month
- ☆18Jun 25, 2024Updated last year
- Contextrie curates what each agent sees so tasks stay sharp from step one to step one thousand.☆58Apr 3, 2026Updated last month
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated last year