j91321 / conti-manuals-analysis
Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.
☆18Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for conti-manuals-analysis
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆12Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- A simple injector that uses LoadLibraryA☆16Updated 4 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆36Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated last year
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 10 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆10Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 3 years ago
- ☆12Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Yet, Another Packer/Loader☆25Updated last year
- CSharp4Pentesters☆12Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆13Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 2 years ago