A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant
☆225Apr 17, 2017Updated 8 years ago
Alternatives and similar repositories for doublepulsar-c2-traffic-decryptor
Users that are interested in doublepulsar-c2-traffic-decryptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,032Feb 3, 2020Updated 6 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆123Jun 27, 2017Updated 8 years ago
- EternalRocks worm☆469May 25, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Running CVE-2017-8759 exploit sample.☆256Jan 23, 2020Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- CVE-2017-7269 to webshell or shellcode loader☆88May 16, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆305Jan 12, 2023Updated 3 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Mar 9, 2017Updated 9 years ago
- Brute forcer and shell deployer for WildFly☆99Mar 10, 2018Updated 8 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆327May 4, 2021Updated 4 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,990Apr 14, 2017Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆121Apr 24, 2019Updated 6 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Malware exploits☆558Aug 22, 2025Updated 7 months ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 5 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆995Feb 10, 2019Updated 7 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- Exploit primitives for PowerShell☆436Mar 25, 2018Updated 8 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago