naacbin / CovenantDecryptor
☆20Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for CovenantDecryptor
- ☆27Updated 3 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆79Updated 9 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- Configuration Extractors for Malware☆54Updated last month
- Lifetime AMSI bypass.☆36Updated 4 months ago
- ☆43Updated 4 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 6 months ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆38Updated 5 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Powershell Linter☆46Updated last month
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆82Updated 7 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- ☆37Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆95Updated 7 months ago
- ☆98Updated 3 weeks ago
- Docker container for running CobaltStrike 4.10☆33Updated 2 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- malleable profile generator GUI for Havoc☆56Updated last year
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- ☆44Updated 3 weeks ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 5 months ago
- Find DLLs with RWX section☆75Updated last year