fox-it / operation-wocaoView external linksLinks
Operation Wocao - Indicators of Compromise
☆30Dec 19, 2019Updated 6 years ago
Alternatives and similar repositories for operation-wocao
Users that are interested in operation-wocao are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Test a host for susceptibility to CVE-2019-19781☆109Oct 23, 2020Updated 5 years ago
- code written on artificial intelligence lab at school☆10Oct 4, 2021Updated 4 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Sources code extracted from malwares for analysis☆41Mar 10, 2023Updated 2 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- vault plugin for artifactory☆12Aug 30, 2024Updated last year
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆14Dec 3, 2022Updated 3 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- A simple elasticsearch frontend for serving astrophysical simulation catalog data☆10Aug 29, 2025Updated 5 months ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Research into creating tiny .NET executables☆14Apr 21, 2018Updated 7 years ago
- Website contents for nommu.org☆10Sep 30, 2020Updated 5 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago
- Transform the collected configurations into various target configurations, inheriting the art of simplifying complexity. Additionally, it…☆14May 3, 2025Updated 9 months ago
- ☆11Dec 22, 2022Updated 3 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆15Apr 5, 2017Updated 8 years ago
- Yara sort☆13Updated this week
- Логотипы различных дистрибутивов GNU/Linux. Список будет пополняться☆10Mar 17, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- The framework for next generation data center.☆29Aug 24, 2025Updated 5 months ago
- ⚙️ Java vs Kotlin comparison (CLBG benchmarks and static bytecode analysis) ⚙️☆10Jun 27, 2019Updated 6 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- ☆11Apr 11, 2022Updated 3 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago