albertzsigovits / malware-mutexLinks
Muteces (mutexes/mutants) used by various malware families
☆22Updated 7 months ago
Alternatives and similar repositories for malware-mutex
Users that are interested in malware-mutex are comparing it to the libraries listed below
Sorting:
- ☆27Updated 6 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆34Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- Symantec EDR Internals☆26Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- a tiny program to consume from ETW providers for research☆49Updated 5 months ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆24Updated last month
- ☆66Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- Keep it secret, keep it safe☆77Updated 4 months ago