aguinet / crappyLinks
Gandcrab v5.2 decryption scripts
☆16Updated 5 years ago
Alternatives and similar repositories for crappy
Users that are interested in crappy are comparing it to the libraries listed below
Sorting:
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆36Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- Fuzzing Framework☆10Updated 8 years ago
- ☆16Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 8 months ago
- ☆15Updated 4 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- \ PowerAvails Powershell /☆11Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- ☆43Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- PoC ActiveX SVG Document Execution☆21Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago