TheParmak / conti-leaks-englished
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
☆610Updated 3 years ago
Alternatives and similar repositories for conti-leaks-englished:
Users that are interested in conti-leaks-englished are comparing it to the libraries listed below
- A simple python packer to easily bypass Windows Defender☆634Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,447Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆974Updated 3 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆921Updated last year
- Defences against Cobalt Strike☆1,282Updated 2 years ago
- ☆539Updated 3 years ago
- Collection of various malicious functionality to aid in malware development☆1,617Updated last year
- Gets updates from various clearnet domains and ransomware threat actor domains☆386Updated 11 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,188Updated last year
- ☆488Updated last year
- Research code & papers from members of vx-underground.☆1,199Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆838Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,430Updated last year
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,086Updated 2 months ago
- ☆514Updated 5 months ago
- Elastic Security detection content for Endpoint☆1,152Updated last week
- Template-Driven AV/EDR Evasion Framework☆1,651Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆785Updated last year
- ☆1,040Updated 10 months ago
- A modern 32/64-bit position independent implant template☆1,175Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,795Updated last year
- ☆1,618Updated 7 months ago
- A C2 post-exploitation framework☆471Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆844Updated 3 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 2 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆397Updated 4 months ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆476Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆904Updated 9 months ago
- Some notes and examples for cobalt strike's functionality☆1,010Updated 3 years ago