interprobe / CoDeRedlightLinks
A simple CDR software for disarming malicious contents contained in documents.
☆10Updated 3 years ago
Alternatives and similar repositories for CoDeRedlight
Users that are interested in CoDeRedlight are comparing it to the libraries listed below
Sorting:
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- ☆57Updated 2 years ago
- hiding in plain sight: part 2☆44Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Updated last year
- A YARA rule generator☆60Updated 3 weeks ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Memory Scaner☆65Updated 3 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Updated last month
- Configuration Extractors for Malware☆123Updated 9 months ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- A malicous Golang Package☆15Updated 9 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆110Updated this week
- A command and control (C2) server☆58Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆36Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61Updated last year
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆46Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- ☆41Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- Repository for archiving Cobalt Strike configuration☆36Updated this week
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- Notes some analysis related to VidarStealer sample☆17Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago