This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as mid-2022, The attack chain starts with backdoor which is a DLL targets both 32-bit and 64-bit Windows
☆12Jun 19, 2024Updated last year
Alternatives and similar repositories for Voodoo-Bear-APT
Users that are interested in Voodoo-Bear-APT are comparing it to the libraries listed below
Sorting:
- ☆14Sep 26, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆31Aug 13, 2025Updated 7 months ago
- ☆11Aug 18, 2023Updated 2 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Fine-tune BERT models to classify Arabic text by different dialects.☆17Aug 8, 2023Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- DFIR project to collect and analyze events in Google Workspace☆13Apr 12, 2024Updated last year
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- ☆24Feb 18, 2025Updated last year
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- ☆29May 10, 2024Updated last year
- ☆48Dec 5, 2025Updated 3 months ago
- ☆10Aug 18, 2025Updated 7 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- ☆74Jun 17, 2025Updated 9 months ago
- Python Exploitation Framework☆38Mar 9, 2026Updated last week
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆44Jun 12, 2024Updated last year
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆48Updated this week
- ☆28May 25, 2021Updated 4 years ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated 3 weeks ago
- Presence detection using RTL8720DN 2.4G/5G Dual Bands Wifi Module☆42Sep 29, 2023Updated 2 years ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- Using the QOI image format to save sequences of images☆10Feb 12, 2022Updated 4 years ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago