Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected
☆25Dec 31, 2018Updated 7 years ago
Alternatives and similar repositories for FastCashMalwareDissected
Users that are interested in FastCashMalwareDissected are comparing it to the libraries listed below
Sorting:
- Brute force attack on private keys of bitcoin wallet with 12 long seed passphrase☆10Dec 23, 2021Updated 4 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Feb 23, 2019Updated 7 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Slides from my Area41 security conference talk in Zurich/CH☆18Aug 3, 2019Updated 6 years ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 2 months ago
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆34Apr 2, 2024Updated last year
- ☆31Jan 9, 2022Updated 4 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- ☆37Sep 30, 2021Updated 4 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- ☆14Feb 13, 2017Updated 9 years ago
- Kernel driver for the Ralink rt5572 dual-band Wi-Fi adapter, configured for use with Boundary Devices boards☆14Jun 26, 2014Updated 11 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- ☆12Oct 1, 2024Updated last year
- A proof of concept of a PHP Miner that can mine DuinoCoin☆10Apr 4, 2022Updated 3 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- The Manipulator's Cookbook, probably almost the only book you'll need to gain power, manipulate a person or a group and contains all kind…☆12Nov 12, 2023Updated 2 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- ☆43Oct 11, 2023Updated 2 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- ☆11Jan 18, 2023Updated 3 years ago
- Various android tools from Lingnu Open Source Consulting Ltd.☆14Mar 5, 2013Updated 12 years ago
- Build docker container for @MaskRay's pcap-search☆10Aug 2, 2018Updated 7 years ago
- Create BIP39 mnemonic phrases with N number of dice sides☆12Apr 14, 2018Updated 7 years ago
- Repository of OneOps related slide decks and other training material.☆13Sep 4, 2020Updated 5 years ago
- ☆16Jun 1, 2018Updated 7 years ago