Hive v5 file decryption algorithm
☆34Nov 28, 2022Updated 3 years ago
Alternatives and similar repositories for HiveV5_file_decryptor
Users that are interested in HiveV5_file_decryptor are comparing it to the libraries listed below
Sorting:
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- ☆23Oct 9, 2024Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- llama is lightgrep's amazing media analyzer☆16Oct 28, 2025Updated 4 months ago
- Password:ВсеБудеУкраїна☆16Mar 21, 2022Updated 3 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- command control framework☆32Updated this week
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 6 months ago
- ☆52Sep 5, 2018Updated 7 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- ☆32Apr 24, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated 10 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆28Feb 21, 2026Updated last week
- A Poc on blocking Procmon from monitoring network events☆110Aug 7, 2025Updated 6 months ago
- Binary commandline executable to parse ETL files☆69Jun 7, 2018Updated 7 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆25Oct 12, 2021Updated 4 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- ☆22Aug 11, 2024Updated last year
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Mar 27, 2023Updated 2 years ago
- Download all of a given user's public Pastebin pastes☆33Apr 16, 2025Updated 10 months ago
- A script to convert a Cellebrite UFDR to the original file structure.☆74Mar 21, 2022Updated 3 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago