f0wl / blackCatConf
Configuration Extractor for BlackCat Ransomware
☆30Updated 3 years ago
Alternatives and similar repositories for blackCatConf
Users that are interested in blackCatConf are comparing it to the libraries listed below
Sorting:
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆27Updated 5 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated 10 months ago
- ☆14Updated last year
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated 2 months ago
- Golang bindings for PE-sieve☆43Updated last year
- Tools for offensive security of NetBackup infrastructures☆40Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- bad stuffs by bad guys☆48Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆16Updated 4 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- ☆32Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 3 weeks ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆24Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year
- ☆20Updated last year