A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant
☆225Apr 17, 2017Updated 8 years ago
Alternatives and similar repositories for doublepulsar-c2-traffic-decryptor
Users that are interested in doublepulsar-c2-traffic-decryptor are comparing it to the libraries listed below
Sorting:
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,031Feb 3, 2020Updated 6 years ago
- EternalRocks worm☆467May 25, 2017Updated 8 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆123Jun 27, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- Running CVE-2017-8759 exploit sample.☆256Jan 23, 2020Updated 6 years ago
- CVE-2017-7269 to webshell or shellcode loader☆88May 16, 2017Updated 8 years ago
- Brute forcer and shell deployer for WildFly☆100Mar 10, 2018Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆303Jan 12, 2023Updated 3 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 6 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆327May 4, 2021Updated 4 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- An exploit for Apache Struts CVE-2017-5638☆442May 21, 2018Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Mar 9, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- ☆113Jun 5, 2017Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆237Dec 6, 2018Updated 7 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- Tutorial for writing kernel exploits☆256Aug 10, 2025Updated 6 months ago