azrilrahim / cryptolocker-dgaLinks
this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for its bots or C&C per day. This cmd line contains reverse engineered seed from GoZ and should be able to generate the same DGA results. This code is a part of my research on Cyber Threat Intelligence. GNU open sour…
☆13Updated 8 years ago
Alternatives and similar repositories for cryptolocker-dga
Users that are interested in cryptolocker-dga are comparing it to the libraries listed below
Sorting:
- ☆16Updated 10 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 8 months ago
- ☆15Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆46Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 8 years ago
- A Simple PE File Heuristics Scanners☆50Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- Malware samples observed in the wild from time to time☆12Updated 6 years ago