m4now4r / VidarStealerLinks
Notes some analysis related to VidarStealer sample
☆14Updated last year
Alternatives and similar repositories for VidarStealer
Users that are interested in VidarStealer are comparing it to the libraries listed below
Sorting:
- ☆27Updated 6 months ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- ☆28Updated last year
- PoC-Malware-TTPs☆49Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated 8 months ago
- ☆18Updated 6 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆18Updated last year
- ☆30Updated 6 months ago
- ☆18Updated 4 months ago
- ☆24Updated 2 years ago
- ECC Public Key Cryptography☆37Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆31Updated this week
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆18Updated 2 years ago
- ☆22Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year