yo-yo-yo-jbo / ransomware_in_a_minuteLinks
☆11Updated 2 years ago
Alternatives and similar repositories for ransomware_in_a_minute
Users that are interested in ransomware_in_a_minute are comparing it to the libraries listed below
Sorting:
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆18Updated 7 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Updated last year
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- ☆27Updated 3 weeks ago
- Progress of learning kernel development☆14Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆12Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆16Updated 3 months ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- ☆15Updated last year
- all random stuff that dont warrant a seperate repo☆12Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- ☆27Updated 8 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆48Updated last year
- A collection of my presentation materials.☆17Updated last year