Liberating dem proprietary APT implants
☆20Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for apthowto
Users that are interested in apthowto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 6 years ago
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 7 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 7 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python IOC Editor☆66Mar 10, 2015Updated 11 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆20Oct 23, 2020Updated 5 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆38Apr 22, 2019Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- CVE-2019-0604☆133Mar 22, 2019Updated 7 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 7 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- For all these times you're asking yourself "what is this panel again?"☆262Jan 29, 2026Updated 3 months ago
- Inject any C# code into programs with lua☆18Mar 2, 2012Updated 14 years ago
- Metamorphic Code Generator & Loader☆15Dec 7, 2020Updated 5 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 11 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- Calculate and Track SSL and Domain expiration dates☆16Mar 31, 2020Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 8 years ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Apr 29, 2020Updated 6 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 4 years ago