johnbergbom / PeddleCheapLinks
Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.
☆16Updated 7 years ago
Alternatives and similar repositories for PeddleCheap
Users that are interested in PeddleCheap are comparing it to the libraries listed below
Sorting:
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- ☆15Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- Gandcrab v5.2 decryption scripts☆15Updated 5 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 4 months ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- ☆36Updated 5 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 9 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- ☆12Updated 7 years ago
- ☆43Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 9 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ☆47Updated 5 years ago
- ☆15Updated 7 years ago