Count Dracul Yeamin the Scorpio's Projects
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
Damn Vulnerable Web Application (DVWA)
Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)
ā£ļø Stealer chrome v81+, Firefox v75+, And more than 30 different programs and crypto-wallets
A fully automated Trading Bot using Ichimoku Indicator
iOS/macOS/Linux Remote Administration Tool
Electron website
M-x start-hacking
Emotet detection tool for Windows OS
IOC Collection 2022
a State-Machine reversing exercise
Emotet Loader helps execute Emotet modules in isolation. Emotet is one of the most active botnets, that delivers its modules, such as credit card stealer or SMB spreader, to the user machines. Emotet Loader allows to run the modules separately from the core component and help analyzing their behavior.
A quick & dirty look at an Emotet infection.
A quick & dirty look at an Emotet infection.
WIP Emotet Control Flow Unflattening using miasm and radare2
Empire is a PowerShell and Python post-exploitation agent.
A PaaS built on top of Amazon EC2 Container Service (ECS)
Empire client application
PowerShell Empire Web Interface
Easy to use and open-source stealer that's super effective
Droidefense: Advance Android Malware Analysis Framework
A lightweight extension to automatically detect and provide verbose warnings for embedded iframe elements in order to protect against Browser-In-The-Browser (BITB) attacks.
Multiplatform payload dropper
Linux post exploitation privilege escalation enumeration
Decrypted content of eqgrp-auction-file.tar.xz
Archive of leaked Equation Group materials
This is a personal repo containing scripts in py for detecting shells on vuln exchange servers.
Tactical Phising Attacks with ESP8266
Cheap WiFi hacks