Zeroska / telegram-infostealer-monitoring
Small telegram script to automate download sample data leak from telegram channels
☆15Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for telegram-infostealer-monitoring
- Collection of Volatility2 profiles, generated against Linux kernels.☆30Updated this week
- Contains compiled binaries of Volatility☆29Updated last month
- PowerShell Script Analyzer☆66Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- ☆43Updated 7 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆137Updated 5 months ago
- ☆36Updated 7 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- yara detection rules for hunting with the threathunting-keywords project☆87Updated this week
- ☆64Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆35Updated 10 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆56Updated 2 months ago
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- Some of my Malware Analysis writeups.☆42Updated last year
- A collection of tools, scripts and personal research☆113Updated 4 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆46Updated 11 months ago
- Jasmin ransomware web panel path traversal PoC☆22Updated 7 months ago
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆109Updated last year
- C2 Active Scanner☆48Updated 5 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆12Updated 4 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Command and Control (C2) framework☆121Updated 7 months ago
- Hive v5 file decryption algorithm☆34Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆103Updated 2 months ago
- Just some lists of Malware Configs☆159Updated last month
- Repository of Yara Rules☆88Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆43Updated 2 months ago