TheParmak / conti-leaks-englishedLinks
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆616Updated 3 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
Sorting:
- Leaked pentesting manuals given to Conti ransomware crooks☆1,044Updated 3 years ago
- ☆545Updated 3 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆930Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,473Updated last year
- This is a repository of resource about Malware techniques☆802Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆398Updated last year
- Research code & papers from members of vx-underground.☆1,262Updated 3 years ago
- Some notes and examples for cobalt strike's functionality☆1,097Updated 3 years ago
- ☆499Updated last year
- A simple python packer to easily bypass Windows Defender☆640Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆843Updated 2 years ago
- ☆1,052Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,212Updated last year
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,692Updated last year
- Some usefull Scripts and Executables for Pentest & Forensics☆1,128Updated 3 weeks ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)☆440Updated 3 years ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,165Updated 5 months ago
- Create fake certs for binaries using windows binaries and the power of bat files☆564Updated last year
- Elastic Security detection content for Endpoint☆1,235Updated this week
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆800Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,701Updated last year
- Defences against Cobalt Strike☆1,286Updated 3 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆978Updated last month
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,452Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆816Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆853Updated 3 years ago
- This repo covers some code execution and AV Evasion methods for Macros in Office documents☆1,245Updated 3 years ago