reecdeep / HiveV5_keystream_decryptor
bad stuffs by bad guys
☆47Updated 2 years ago
Alternatives and similar repositories for HiveV5_keystream_decryptor:
Users that are interested in HiveV5_keystream_decryptor are comparing it to the libraries listed below
- ☆63Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- My Malware Analysis Reports☆19Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 8 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Yara Rules for Modern Malware☆73Updated 10 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆29Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆59Updated last month
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Collection of Malware Lures☆23Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 3 months ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- ☆22Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆57Updated 2 years ago
- ☆37Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆109Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 3 years ago
- ☆34Updated last year
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- ☆21Updated 3 months ago
- C2 Active Scanner☆51Updated 7 months ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Updated last year
- ☆25Updated last month
- Lazarus analysis tools and research report☆55Updated last year
- ☆15Updated 3 years ago
- ☆22Updated 7 months ago
- Configuration Extractors for Malware☆55Updated 2 weeks ago