ditekshen / is-wos
Information Stealers Wall of Sheep (IS-WOS)
☆12Updated 4 years ago
Alternatives and similar repositories for is-wos:
Users that are interested in is-wos are comparing it to the libraries listed below
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- ☆12Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- ☆22Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Updated 4 years ago
- Free Email Providers☆10Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Hashes of infamous malware☆26Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆26Updated 7 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆10Updated 7 years ago