robindimyan / apthowtoLinks
Liberating dem proprietary APT implants
☆20Updated 6 years ago
Alternatives and similar repositories for apthowto
Users that are interested in apthowto are comparing it to the libraries listed below
Sorting:
- ☆23Updated 5 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- ☆60Updated 5 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- ☆20Updated 7 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- ☆11Updated 5 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 6 years ago
- Presentation materials for talks I've given.☆20Updated 6 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Example VBA Macro for MacOS Mojave☆66Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 7 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Updated 6 years ago
- Telsy CTI Research Team☆57Updated 5 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Updated 10 months ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆30Updated 7 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- C# User Simulation☆33Updated 3 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago