Configuration Extractor for BlackCat Ransomware
☆31Mar 18, 2022Updated 4 years ago
Alternatives and similar repositories for blackCatConf
Users that are interested in blackCatConf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- ☆25Jul 23, 2024Updated last year
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- SMTP honeypot written in Golang☆33Aug 9, 2016Updated 9 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 7 months ago
- Elastic SIEM template for docker☆19Oct 6, 2021Updated 4 years ago
- Guest lecture about modern DRM analysis at Ruhr-Universität Bochum.☆13Jun 10, 2024Updated last year
- A Working Discord Selfbot 2022 🔥 Made By TheAxes☆12Oct 22, 2022Updated 3 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- An automatic unpacker and logger for DotNet Framework targeting files☆264Aug 23, 2023Updated 2 years ago
- ☆10Sep 6, 2023Updated 2 years ago
- ☆14May 17, 2025Updated 10 months ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Aug 30, 2022Updated 3 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Share your computer's stats (CPU/GPU usage & temp) using DiscordRPC☆14Jun 9, 2025Updated 9 months ago
- A multiplatform spyware with many features.☆13Sep 24, 2021Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Mar 16, 2026Updated last week
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- simple discord webhook protector can be hosted anywhere easly☆13Jun 26, 2023Updated 2 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ☆17Jun 14, 2023Updated 2 years ago