Scripts for communication with Bunitu Trojan C&Cs
☆19Oct 29, 2015Updated 10 years ago
Alternatives and similar repositories for bunitu_tests
Users that are interested in bunitu_tests are comparing it to the libraries listed below
Sorting:
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy…☆13Oct 20, 2017Updated 8 years ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 6 months ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- ☆23Feb 3, 2021Updated 5 years ago
- Various snippets created during malware analysis☆463Oct 3, 2025Updated 4 months ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- A PowerShell function that scans for the existence of a Sticky Keys backdoor.☆24Aug 10, 2017Updated 8 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Sep 23, 2018Updated 7 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Memory searching utilities☆43Nov 11, 2013Updated 12 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Network visualizer tool built using Processing☆24Jun 23, 2021Updated 4 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- A standalone PHP backdoor for use on *nix and Windows systems.☆50Sep 24, 2016Updated 9 years ago
- Run you Localhost Server☆27Oct 13, 2024Updated last year
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago