k-vitali / cryptomix-clop-ransomwareLinks
☆14Updated 6 years ago
Alternatives and similar repositories for cryptomix-clop-ransomware
Users that are interested in cryptomix-clop-ransomware are comparing it to the libraries listed below
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆23Updated 5 years ago
- ☆36Updated 6 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- ☆24Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- ☆12Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆14Updated 4 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- My Shellcode Archive☆29Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago