TheParmak / conti-leaks-englishedLinks
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆617Updated 3 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
Sorting:
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆933Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆405Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆1,054Updated 4 years ago
- ☆546Updated 3 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆750Updated 2 months ago
- This is a repository of resource about Malware techniques☆809Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆855Updated 3 years ago
- ☆513Updated 10 months ago
- ☆503Updated last year
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- Elastic Security detection content for Endpoint☆1,271Updated this week
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,482Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆782Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆806Updated last year
- Defences against Cobalt Strike☆1,292Updated 3 years ago
- Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)☆446Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,017Updated 8 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆583Updated last year
- Sophos-originated indicators-of-compromise from published reports☆627Updated 3 weeks ago
- Research code & papers from members of vx-underground.☆1,288Updated 3 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆569Updated last year
- MAL-CL (Malicious Command-Line)☆316Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆645Updated 3 years ago
- ☆1,064Updated last year
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆529Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,451Updated 2 years ago
- Ransomware simulator written in Golang☆445Updated 3 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆745Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆772Updated 2 years ago