TheParmak / conti-leaks-englished
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆602Updated 2 years ago
Alternatives and similar repositories for conti-leaks-englished:
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆918Updated last year
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,428Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,614Updated last year
- ☆506Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,180Updated last year
- EXOCET - AV-evading, undetectable, payload delivery tool☆838Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,554Updated 10 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆961Updated 3 years ago
- The swiss army knife of LSASS dumping☆1,840Updated 4 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆890Updated 7 months ago
- This is a repository of resource about Malware techniques☆777Updated last year
- Research code & papers from members of vx-underground.☆1,174Updated 3 years ago
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆730Updated 3 years ago
- A simple python packer to easily bypass Windows Defender☆632Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆699Updated 5 months ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,008Updated 2 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,884Updated 5 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆372Updated 8 months ago
- Create fake certs for binaries using windows binaries and the power of bat files☆548Updated 9 months ago
- A modern 64-bit position independent implant template☆1,093Updated 7 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,414Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆781Updated 9 months ago
- Collect information of Windows PC when doing incident response☆243Updated last year
- ☆480Updated last year
- Some notes and examples for cobalt strike's functionality☆995Updated 2 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆662Updated 3 weeks ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,554Updated 2 years ago
- ☆739Updated last year
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆695Updated last month