Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆622Mar 16, 2022Updated 4 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Leaked pentesting manuals given to Conti ransomware crooks☆1,080Aug 17, 2021Updated 4 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆134Mar 2, 2022Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Jun 26, 2023Updated 2 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆179May 11, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- ☆19Mar 3, 2022Updated 4 years ago
- Some notes and examples for cobalt strike's functionality☆1,133Feb 8, 2022Updated 4 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,302Aug 15, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,413Nov 22, 2023Updated 2 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆17Jul 30, 2020Updated 5 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,103Mar 3, 2026Updated 2 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Defences against Cobalt Strike☆1,302Jul 14, 2022Updated 3 years ago
- ☆1,683Apr 14, 2025Updated last year
- ☆1,812Aug 30, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,600Dec 31, 2025Updated 4 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆86Mar 3, 2022Updated 4 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- ☆554Mar 11, 2026Updated last month
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆582Mar 8, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Jan 6, 2023Updated 3 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,500Apr 21, 2026Updated 2 weeks ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆460Oct 25, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,106Nov 20, 2025Updated 5 months ago
- game of active directory☆7,771Mar 12, 2026Updated last month
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆761Nov 16, 2021Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,824Apr 28, 2026Updated last week
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆642Apr 3, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Template-Driven AV/EDR Evasion Framework☆1,796Nov 3, 2023Updated 2 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- APT & CyberCriminal Campaign Collection☆4,074Jul 25, 2024Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆18,017Sep 10, 2025Updated 7 months ago
- The Hunt for Malicious Strings☆1,378May 13, 2025Updated 11 months ago
- ☆1,134Dec 19, 2023Updated 2 years ago