Operation Wocao - Indicators of Compromise
☆30Dec 19, 2019Updated 6 years ago
Alternatives and similar repositories for operation-wocao
Users that are interested in operation-wocao are comparing it to the libraries listed below
Sorting:
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Test a host for susceptibility to CVE-2019-19781☆109Oct 23, 2020Updated 5 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- code written on artificial intelligence lab at school☆10Oct 4, 2021Updated 4 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- Fix missing Linux firmware kernel modules!☆17Jan 1, 2024Updated 2 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- vault plugin for artifactory☆12Aug 30, 2024Updated last year
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Find or build all reverse dependencies of a Haskell package using Nix☆14Jul 26, 2020Updated 5 years ago
- A simple elasticsearch frontend for serving astrophysical simulation catalog data☆10Aug 29, 2025Updated 6 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Логотипы различных дистрибутивов GNU/Linux. Список будет пополняться☆10Mar 17, 2023Updated 2 years ago
- ☆15Apr 5, 2017Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Random tools and utilities for use with the iOS kernel☆10Jan 7, 2013Updated 13 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Multi-algo CPUMiner☆13Apr 2, 2016Updated 9 years ago