WithSecureLabs / doublepulsar-c2-traffic-decryptorLinks
A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant
☆225Updated 8 years ago
Alternatives and similar repositories for doublepulsar-c2-traffic-decryptor
Users that are interested in doublepulsar-c2-traffic-decryptor are comparing it to the libraries listed below
Sorting:
- Public repository for improvements to the EXTRABACON exploit☆163Updated 9 years ago
- Fancy Bear Source Code☆263Updated 9 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆181Updated 8 years ago
- Honeypot deployment made easy☆237Updated 6 years ago
- Various PoCs☆502Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Updated 8 years ago
- MS17-010 Research☆96Updated 8 years ago
- Published security vulnerabilities, research, and associated information.☆138Updated 6 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆240Updated 7 years ago
- Telnet Honeypot☆163Updated 6 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- EQGRP-Free-Files here.,☆46Updated 9 years ago
- A webshell framework for penetration testers.☆300Updated 6 months ago
- Running CVE-2017-8759 exploit sample.☆257Updated 6 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- A graphical security analysis tool for IoT networks☆200Updated 6 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆160Updated 5 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆151Updated 10 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Updated 8 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Updated 6 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- A decryptor for Wanacry (you need the private key!)☆183Updated 8 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆204Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆353Updated 3 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Updated 9 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago