srozb / mirai-utilsLinks
reveal xored strings in mirai binary
☆12Updated 6 years ago
Alternatives and similar repositories for mirai-utils
Users that are interested in mirai-utils are comparing it to the libraries listed below
Sorting:
- ☆11Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 3 months ago
- Scripts targeting specific families☆13Updated 7 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆15Updated 4 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- ☆24Updated 9 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆27Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- ☆43Updated 6 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago