platdrag / UnblockableChains
Unblockable Chains - A POC on using blockchain as infrastructure for malware operations
☆67Updated 6 years ago
Alternatives and similar repositories for UnblockableChains:
Users that are interested in UnblockableChains are comparing it to the libraries listed below
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- ☆59Updated 5 years ago
- All the Power with no Shell☆36Updated 3 years ago
- A large repository of links spanning all topics in information security.☆13Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- ☆114Updated 7 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆116Updated 5 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- ☆14Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆147Updated 5 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆128Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 8 years ago
- A Generic Windows Memory Scraping Tool☆70Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- ☆50Updated 7 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 7 years ago