f0wl / blackCatConf
Configuration Extractor for BlackCat Ransomware
☆30Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for blackCatConf
- Configuration Extractors for Malware☆53Updated 3 weeks ago
- Hive v5 file decryption algorithm☆34Updated last year
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆35Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆26Updated 3 months ago
- ☆22Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆35Updated 10 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- ☆37Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 5 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 4 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- My Malware Analysis Reports☆17Updated 2 years ago
- Discord C2 Profile for Mythic☆24Updated 6 months ago
- PoC-Malware-TTPs☆48Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- ☆17Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- ☆13Updated 2 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated last year