Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆619Mar 16, 2022Updated 4 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Leaked pentesting manuals given to Conti ransomware crooks☆1,074Aug 17, 2021Updated 4 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆134Mar 2, 2022Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆933Jun 26, 2023Updated 2 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆177May 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- ☆19Mar 3, 2022Updated 4 years ago
- Some notes and examples for cobalt strike's functionality☆1,132Feb 8, 2022Updated 4 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,299Aug 15, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,409Nov 22, 2023Updated 2 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,099Mar 3, 2026Updated last month
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Defences against Cobalt Strike☆1,297Jul 14, 2022Updated 3 years ago
- ☆1,677Apr 14, 2025Updated last year
- ☆1,803Aug 30, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,588Dec 31, 2025Updated 3 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Mar 3, 2022Updated 4 years ago
- Conti Ransomware malware leak WITH LOCKER☆25Mar 5, 2022Updated 4 years ago
- ☆550Mar 11, 2026Updated last month
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,783Jan 6, 2023Updated 3 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,494Feb 16, 2026Updated last month
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆460Oct 25, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,099Nov 20, 2025Updated 4 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆759Nov 16, 2021Updated 4 years ago
- game of active directory☆7,691Mar 12, 2026Updated last month
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,783Updated this week
- A C2 post-exploitation framework☆486Jan 24, 2024Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆644Apr 3, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Template-Driven AV/EDR Evasion Framework☆1,790Nov 3, 2023Updated 2 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- APT & CyberCriminal Campaign Collection☆4,061Jul 25, 2024Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,953Sep 10, 2025Updated 7 months ago
- The Hunt for Malicious Strings☆1,374May 13, 2025Updated 11 months ago
- ☆1,133Dec 19, 2023Updated 2 years ago