azrilrahim / cryptolocker-dga
this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for its bots or C&C per day. This cmd line contains reverse engineered seed from GoZ and should be able to generate the same DGA results. This code is a part of my research on Cyber Threat Intelligence. GNU open sour…
☆13Updated 8 years ago
Alternatives and similar repositories for cryptolocker-dga:
Users that are interested in cryptolocker-dga are comparing it to the libraries listed below
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 4 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 5 months ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- A collection of YARA signatures that I have found around the web.☆11Updated 8 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆12Updated 3 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- PoC malware built by copy-paste☆24Updated 4 years ago
- ☆23Updated 4 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- Methods of C2☆21Updated 9 years ago
- ☆15Updated 4 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- ☆16Updated 9 years ago
- ☆23Updated 7 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆29Updated 2 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated 5 months ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago