APT34/OILRIG leak
☆11Jun 25, 2019Updated 6 years ago
Alternatives and similar repositories for APT34
Users that are interested in APT34 are comparing it to the libraries listed below
Sorting:
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 4 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- PE (EXE) File Embed wrap, injection of DLL/ASI (based on pefrmdllembed)☆22Dec 25, 2024Updated last year
- ☆21May 4, 2017Updated 8 years ago
- a "process-less" trojan☆12May 9, 2020Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 12 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- ☆23Jul 7, 2020Updated 5 years ago
- ☆28Aug 31, 2014Updated 11 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆25Sep 16, 2018Updated 7 years ago
- BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a …☆31May 22, 2023Updated 2 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- Operation Wocao - Indicators of Compromise☆30Dec 19, 2019Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- ☆10Aug 9, 2024Updated last year
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago