Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32
☆17Aug 9, 2024Updated last year
Alternatives and similar repositories for defcon32_dissecting_defeating_ransomwares_evasion
Users that are interested in defcon32_dissecting_defeating_ransomwares_evasion are comparing it to the libraries listed below
Sorting:
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆45Jun 17, 2025Updated 8 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 4 months ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 10 months ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- ☆42Dec 24, 2024Updated last year
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated 2 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- CodeMash 2023 - resources for Automating Almost All Application Security Things with CI/CD -- Even Honeypots!☆13Jan 12, 2023Updated 3 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 2 months ago
- ☆11Dec 17, 2024Updated last year
- Example AIDL service and client☆11Nov 30, 2021Updated 4 years ago
- Quickly manage DNS records for domains owned within GoDaddy, Namecheap and Route53☆11Jul 19, 2021Updated 4 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- This repository contains the pytorch code for our BMVC 2022 paper "BaseTransformers: Attention over base data-points for One Shot Learnin…☆13Mar 20, 2024Updated last year
- ☆16Feb 17, 2025Updated last year
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 9 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 8 months ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- SSE to Stdio MCP Proxy Server☆19Feb 17, 2026Updated 3 weeks ago
- All Cryptography Algorithms are implemented in C.☆13Mar 28, 2021Updated 4 years ago
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated 3 weeks ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆99Sep 10, 2025Updated 6 months ago
- Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Inclu…☆22Dec 26, 2025Updated 2 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- Labs for deep learning courses at UPC ETSETB TelecomBCN.☆17Updated this week
- python3 version of cloacked-pixel.☆11Oct 8, 2022Updated 3 years ago