A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant
☆225Apr 17, 2017Updated 9 years ago
Alternatives and similar repositories for doublepulsar-c2-traffic-decryptor
Users that are interested in doublepulsar-c2-traffic-decryptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,029Feb 3, 2020Updated 6 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆123Jun 27, 2017Updated 8 years ago
- EternalRocks worm☆467May 25, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Nov 19, 2017Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Anything related to Ghidra☆12Apr 22, 2019Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 6 years ago
- Running CVE-2017-8759 exploit sample.☆256Jan 23, 2020Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 9 years ago
- CVE-2017-7269 to webshell or shellcode loader☆88May 16, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆307Jan 12, 2023Updated 3 years ago
- Brute forcer and shell deployer for WildFly☆98Mar 10, 2018Updated 8 years ago
- Various PoCs☆501Jan 27, 2020Updated 6 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆327May 4, 2021Updated 4 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,994Apr 14, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 7 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Mar 9, 2017Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆995Feb 10, 2019Updated 7 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- Malware exploits☆559Aug 22, 2025Updated 8 months ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆312Sep 10, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆444Jul 11, 2017Updated 8 years ago