TheParmak / conti-leaks-englishedLinks
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆616Updated 3 years ago
Alternatives and similar repositories for conti-leaks-englished
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
Sorting:
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆937Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,075Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,495Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆412Updated last year
- ☆518Updated 2 years ago
- ☆513Updated last year
- Defences against Cobalt Strike☆1,291Updated 3 years ago
- Collect information of Windows PC when doing incident response☆253Updated 2 years ago
- This is a repository of resource about Malware techniques☆822Updated 2 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆796Updated last month
- Create fake certs for binaries using windows binaries and the power of bat files☆569Updated last year
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆180Updated 4 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆843Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆861Updated 4 years ago
- Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)☆448Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Updated 2 years ago
- Research code & papers from members of vx-underground.☆1,347Updated 4 years ago
- Some notes and examples for cobalt strike's functionality☆1,123Updated 3 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,151Updated last month
- Sandman is a NTP based backdoor for hardened networks.☆816Updated last year
- Elastic Security detection content for Endpoint☆1,365Updated 2 weeks ago
- Sophos-originated indicators-of-compromise from published reports☆647Updated last week
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆751Updated 4 years ago
- PowerShell Ransomware Simulator with C2 Server☆498Updated 3 weeks ago
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆871Updated 3 weeks ago
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆822Updated 2 years ago
- Bringing you the best of the worst files on the Internet.☆345Updated 4 years ago
- Template-Driven AV/EDR Evasion Framework☆1,769Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆748Updated 3 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587Updated last year