f0wl / blackCatConfLinks
Configuration Extractor for BlackCat Ransomware
☆30Updated 3 years ago
Alternatives and similar repositories for blackCatConf
Users that are interested in blackCatConf are comparing it to the libraries listed below
Sorting:
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 5 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 3 months ago
- ☆27Updated 6 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- ☆18Updated last year
- ☆54Updated 5 months ago
- ☆14Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- ☆24Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- Yara Rules for Modern Malware☆77Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated 11 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated 2 years ago
- ☆22Updated last year
- Golang bindings for PE-sieve☆43Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆27Updated 11 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year