Liberating dem proprietary APT implants
☆20Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for apthowto
Users that are interested in apthowto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Aug 6, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 11 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆38Apr 22, 2019Updated 6 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- For all these times you're asking yourself "what is this panel again?"☆261Jan 29, 2026Updated last month
- Inject any C# code into programs with lua☆18Mar 2, 2012Updated 14 years ago
- Metamorphic Code Generator & Loader☆15Dec 7, 2020Updated 5 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 11 years ago
- Calculate and Track SSL and Domain expiration dates☆16Mar 31, 2020Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 7 years ago
- Anti-.NET Malware/Packers - Detect most .NET Packers (and some native) used for malware.☆25May 7, 2017Updated 8 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 3 years ago