TheParmak / conti-leaks-englished
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆612Updated 3 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
Sorting:
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆926Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆1,025Updated 3 years ago
- This is a repository of resource about Malware techniques☆794Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆638Updated 3 years ago
- ☆1,045Updated 11 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,452Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,204Updated last year
- Collection of various malicious functionality to aid in malware development☆1,652Updated last year
- ☆541Updated 3 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆182Updated 3 years ago
- ☆490Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆760Updated last year
- Some usefull Scripts and Executables for Pentest & Forensics☆1,115Updated 5 months ago
- Defences against Cobalt Strike☆1,283Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆390Updated last year
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆796Updated 11 months ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆840Updated 2 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆658Updated 3 weeks ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆783Updated 2 years ago
- Some notes and examples for cobalt strike's functionality☆1,080Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,988Updated 5 months ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆954Updated 5 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,442Updated last year
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆811Updated last year
- Create fake certs for binaries using windows binaries and the power of bat files☆562Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆850Updated 3 years ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆788Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 3 months ago
- Collect information of Windows PC when doing incident response☆253Updated last year