SrujanKumar-K / AsyncRATLinks
Extracting AsyncRAT configuration using CyberChef
☆12Updated 3 years ago
Alternatives and similar repositories for AsyncRAT
Users that are interested in AsyncRAT are comparing it to the libraries listed below
Sorting:
- Configuration Extractors for Malware☆113Updated 4 months ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆175Updated 2 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆156Updated 4 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆35Updated 3 years ago
- Repository of Yara Rules☆115Updated 5 months ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆51Updated last month
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- ☆49Updated last week
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆88Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆122Updated this week
- My Malware Analysis Reports☆23Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆134Updated 10 months ago
- ETW based POC to identify direct and indirect syscalls☆188Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆116Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆103Updated 5 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Updated last week
- ☆38Updated 6 months ago
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆174Updated 4 months ago
- ☆28Updated 3 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆37Updated 2 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆189Updated 2 years ago