TheParmak / conti-leaks-englishedView external linksLinks
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆616Mar 16, 2022Updated 3 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
Sorting:
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Mar 2, 2022Updated 3 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,075Aug 17, 2021Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Jun 26, 2023Updated 2 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Some notes and examples for cobalt strike's functionality☆1,124Feb 8, 2022Updated 4 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆167May 11, 2023Updated 2 years ago
- Conti Locker source code☆198Mar 2, 2022Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,301Aug 15, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,867Aug 18, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,578Dec 31, 2025Updated last month
- Defences against Cobalt Strike☆1,293Jul 14, 2022Updated 3 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- ☆1,781Aug 30, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,399Nov 22, 2023Updated 2 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,088Jun 17, 2025Updated 8 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,088Nov 20, 2025Updated 2 months ago
- ☆1,667Apr 14, 2025Updated 10 months ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,462Updated this week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,782Jan 6, 2023Updated 3 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆753Nov 16, 2021Updated 4 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Oct 25, 2021Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated last year
- A C2 post-exploitation framework☆482Jan 24, 2024Updated 2 years ago
- Template-Driven AV/EDR Evasion Framework☆1,772Nov 3, 2023Updated 2 years ago
- ☆543Sep 9, 2025Updated 5 months ago
- game of active directory☆7,437Jul 16, 2025Updated 7 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,572Updated this week
- The Hunt for Malicious Strings☆1,358May 13, 2025Updated 9 months ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Mar 3, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago
- ☆1,129Dec 19, 2023Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,440Oct 12, 2025Updated 4 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,048Dec 11, 2024Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,821Sep 10, 2025Updated 5 months ago
- Signature engine for all your logs☆173Nov 13, 2023Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,495Dec 21, 2023Updated 2 years ago
- Adversary Emulation Framework☆10,687Updated this week