johnbergbom / PeddleCheap
Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.
☆15Updated 7 years ago
Alternatives and similar repositories for PeddleCheap
Users that are interested in PeddleCheap are comparing it to the libraries listed below
Sorting:
- API functions for Malware Research☆35Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- ☆15Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- ☆47Updated 5 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- ☆12Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- ☆36Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- ☆15Updated 4 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- ☆10Updated 4 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆17Updated 4 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago