yo-yo-yo-jbo / ransomware_in_a_minuteLinks
Creating a ransomware in a minute
☆30Updated 2 years ago
Alternatives and similar repositories for ransomware_in_a_minute
Users that are interested in ransomware_in_a_minute are comparing it to the libraries listed below
Sorting:
- ☆82Updated 11 months ago
- ☆48Updated last year
- ☆84Updated 3 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆23Updated 9 months ago
- A collection of PoCs for different injection techniques on Windows!☆46Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- ☆39Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆71Updated 5 months ago
- IAT Unhooking proof-of-concept☆33Updated last year
- Presentaciones de congresos☆53Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆18Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- create a "simulated internet" cyber range environment☆18Updated 5 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆89Updated 2 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- ☆27Updated 11 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆69Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Detonate malware on VMs and get logs & detection status☆31Updated last week
- ☆11Updated last year
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 3 months ago
- ☆55Updated 10 months ago