moohax / Deep-Drop
Machine learning enabled dropper
☆26Updated last year
Alternatives and similar repositories for Deep-Drop:
Users that are interested in Deep-Drop are comparing it to the libraries listed below
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆24Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- ☆36Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆47Updated 4 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 4 years ago
- Continuous kerberoast monitor☆44Updated last year
- ☆20Updated 4 years ago
- AMSI detection PoC☆31Updated 4 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Ansible role that Installs Mythic☆14Updated 8 months ago
- ☆20Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆20Updated last year
- ☆13Updated last year
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 5 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆18Updated 4 years ago
- Caesar-Cipher based encryption☆29Updated 4 years ago
- ☆13Updated last year
- ☆28Updated 7 years ago
- ☆16Updated 3 years ago
- Repository for LNK stuff☆29Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago