f0wl / blackCatConfLinks
Configuration Extractor for BlackCat Ransomware
☆30Updated 3 years ago
Alternatives and similar repositories for blackCatConf
Users that are interested in blackCatConf are comparing it to the libraries listed below
Sorting:
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 4 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- ☆24Updated 2 years ago
- ☆20Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Lazarus analysis tools and research report☆56Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- ☆18Updated last year
- Malware Analysis tools☆26Updated 9 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- ☆38Updated 2 years ago
- ☆14Updated last year
- ☆22Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- ☆32Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆27Updated 9 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 3 months ago
- Golang bindings for PE-sieve☆43Updated last year
- Python wrappers for mal_unpack☆36Updated last year
- ☆54Updated 6 months ago