azrilrahim / cryptolocker-dgaLinks
this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for its bots or C&C per day. This cmd line contains reverse engineered seed from GoZ and should be able to generate the same DGA results. This code is a part of my research on Cyber Threat Intelligence. GNU open sour…
☆14Updated 9 years ago
Alternatives and similar repositories for cryptolocker-dga
Users that are interested in cryptolocker-dga are comparing it to the libraries listed below
Sorting:
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 11 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Updated 8 years ago
- ☆30Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated last year
- Parses Java Cache IDX files☆39Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- ☆15Updated 4 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- ☆16Updated 10 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 8 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 12 years ago
- ☆23Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Network detector for Winnti malware☆20Updated 7 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 10 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆32Updated 4 years ago
- RIG Exploit Kit (front end)☆30Updated 10 years ago