TheParmak / conti-leaks-englished
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆605Updated 2 years ago
Alternatives and similar repositories for conti-leaks-englished:
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆919Updated last year
- EXOCET - AV-evading, undetectable, payload delivery tool☆837Updated 2 years ago
- Template-Driven AV/EDR Evasion Framework☆1,630Updated last year
- ☆536Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,583Updated 11 months ago
- This is a repository of resource about Malware techniques☆779Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,182Updated last year
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,438Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆841Updated 3 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆967Updated 3 years ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆783Updated 10 months ago
- collection of apis used in malware development☆223Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,586Updated 3 months ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆675Updated last month
- A modern 64-bit position independent implant template☆1,105Updated 8 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,085Updated 2 weeks ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆896Updated 8 months ago
- Elastic Security detection content for Endpoint☆1,111Updated this week
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆928Updated 2 months ago
- Encrypted PE Loader Generator☆539Updated 3 years ago
- A simple python packer to easily bypass Windows Defender☆633Updated 2 years ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,069Updated 2 weeks ago
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆738Updated 3 years ago
- ☆738Updated last year
- ☆1,591Updated 5 months ago
- ☆1,025Updated 8 months ago
- Some notes and examples for cobalt strike's functionality☆1,002Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,961Updated 2 months ago
- Research code & papers from members of vx-underground.☆1,183Updated 3 years ago
- A workshop about Malware Development☆1,620Updated last year