Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆617Mar 16, 2022Updated 4 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
Sorting:
- Leaked pentesting manuals given to Conti ransomware crooks☆1,075Aug 17, 2021Updated 4 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Mar 2, 2022Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆936Jun 26, 2023Updated 2 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆173May 11, 2023Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- ☆19Mar 3, 2022Updated 4 years ago
- Some notes and examples for cobalt strike's functionality☆1,127Feb 8, 2022Updated 4 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,300Aug 15, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,401Nov 22, 2023Updated 2 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,094Mar 3, 2026Updated 2 weeks ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- Defences against Cobalt Strike☆1,298Jul 14, 2022Updated 3 years ago
- ☆1,674Apr 14, 2025Updated 11 months ago
- ☆1,793Aug 30, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,587Dec 31, 2025Updated 2 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Mar 3, 2022Updated 4 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago
- ☆543Mar 11, 2026Updated last week
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated 2 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Jan 6, 2023Updated 3 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,488Feb 16, 2026Updated last month
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆457Oct 25, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,093Nov 20, 2025Updated 4 months ago
- game of active directory☆7,581Mar 12, 2026Updated last week
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆756Nov 16, 2021Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,668Updated this week
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆644Apr 3, 2022Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,784Nov 3, 2023Updated 2 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,372Oct 27, 2023Updated 2 years ago
- APT & CyberCriminal Campaign Collection☆4,046Jul 25, 2024Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,891Sep 10, 2025Updated 6 months ago
- The Hunt for Malicious Strings☆1,368May 13, 2025Updated 10 months ago
- ☆1,133Dec 19, 2023Updated 2 years ago