WithSecureLabs / doublepulsar-c2-traffic-decryptor
A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant
☆224Updated 8 years ago
Alternatives and similar repositories for doublepulsar-c2-traffic-decryptor
Users that are interested in doublepulsar-c2-traffic-decryptor are comparing it to the libraries listed below
Sorting:
- Fancy Bear Source Code☆261Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 5 years ago
- Honeypot deployment made easy☆236Updated 6 years ago
- A webshell framework for penetration testers.☆297Updated last year
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Various PoCs☆491Updated 5 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 9 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆253Updated 2 years ago
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆254Updated 9 years ago
- Telnet Honeypot☆161Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆180Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated last year
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated last year
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- Wolves Among the Sheep☆147Updated last year
- A tool for deploying and detecting use of Active Directory honeytokens☆506Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆153Updated 9 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 7 years ago
- Python framework for IT security tools☆268Updated 8 years ago
- A graphical security analysis tool for IoT networks☆200Updated 6 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Updated 7 years ago