m4now4r / VidarStealer
Notes some analysis related to VidarStealer sample
☆14Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for VidarStealer
- ☆27Updated 3 months ago
- Red Team Projects with chat.openai.com.☆17Updated last year
- ☆50Updated 7 months ago
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- ☆22Updated 2 years ago
- ☆24Updated last month
- redteamrecipe.com☆21Updated 9 months ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 8 months ago
- ☆25Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Configuration Extractors for Malware☆54Updated last month
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 2 years ago
- Malware Analysis tools☆25Updated 2 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆79Updated 9 months ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 10 months ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆74Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated 8 months ago
- Search for c2 servers based on netlas☆39Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆43Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- ☆18Updated 7 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆35Updated 2 months ago
- Repo for all my exploits/PoCs☆27Updated 2 months ago