All Projects → ForbiddenProgrammer → conti-pentester-guide-leak

ForbiddenProgrammer / conti-pentester-guide-leak

Licence: other
Leaked pentesting manuals given to Conti ransomware crooks

Programming Languages

Batchfile
5799 projects

Projects that are alternatives of or similar to conti-pentester-guide-leak

Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-89.12%)
Mutual labels:  cybersecurity, ransomware, redteaming, pentesting-tools
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+152.46%)
Mutual labels:  cybersecurity, infosec, offensive-security
wifi-pentesting-guide
WiFi Penetration Testing Guide
Stars: ✭ 105 (-86.4%)
Mutual labels:  offensive-security, pentest-scripts, pentesting-tools
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-95.08%)
Mutual labels:  cybersecurity, infosec, pentesting-tools
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-92.1%)
Mutual labels:  cybersecurity, infosec, pentesting-tools
SuperLibrary
Information Security Library
Stars: ✭ 60 (-92.23%)
Mutual labels:  cybersecurity, infosec, offensive-security
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-89.77%)
Mutual labels:  cybersecurity, infosec, redteaming
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+534.33%)
Mutual labels:  cybersecurity, pentest-scripts, pentesting-tools
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (-89.77%)
Mutual labels:  cybersecurity, infosec, pentesting-tools
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-83.55%)
Mutual labels:  cybersecurity, infosec
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (-83.03%)
Mutual labels:  cybersecurity, infosec
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-79.4%)
Mutual labels:  cybersecurity, infosec
The Big List Of Hacked Malware Web Sites
This repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-83.81%)
Mutual labels:  cybersecurity, ransomware
Black Widow
GUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-83.94%)
Mutual labels:  cybersecurity, offensive-security
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-81.22%)
Mutual labels:  cybersecurity, infosec
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (-84.07%)
Mutual labels:  cybersecurity, infosec
Awesome Cybersecurity Blueteam
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+170.85%)
Mutual labels:  cybersecurity, infosec
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-79.27%)
Mutual labels:  cybersecurity, infosec
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (-77.72%)
Mutual labels:  cybersecurity, infosec
hackthebox
Notes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 286 (-62.95%)
Mutual labels:  guide, infosec

conti-pentester-guide-leak

This repository was created to archive leaked leaked pentesting materials, which were previously given to Conti ransomware group affilates:

obraz

Mentioned materials covers topics such us:

  • configure the Rclone software with a MEGA for data exfiltration
  • configure the AnyDesk software as a persistence and remote access solution into a victim’s network
  • elevate and gain admin rights inside a company’s hacked network
  • take over domain controllers
  • dump passwords from Active Directories
  • connect to hacked networks via RDP using a Ngrok secure tunnel
  • install the Metasploit pen-testing framework on a VPS
  • brute-force routers, NAS devices, and security cameras
  • configure and use the Cobalt Strike agent
  • perform a Kerberoasting attack
  • use the NetScan tool to scan internal networks
  • disable Windows Defender protections
  • delete shadow volume copies
  • configuring operating system to use the Tor and more

Leaked content will give you more insight into how ransomware operators perform their attacks. Futhermore, you can improve your own pentesting skills. Defenders will also benefit from this - you can more eaisly detect and block Conti affilates attacks.

UPDATE: vx-underground.org obtained more training materials and tools used by Conti ransomware operators. Posting those files could break Github ToS, however, you can find download url's for mentioned materials here.

NOTE: Archive containing CobaltStrike crack was removed to please GitHub's Terms of Service.

NOTE2: Materials are written in Russian language (however, due to misspells, threat actor is believed to be Ukrainian citizen)

NOTE3: If something requires password, try "xss.is" or "exploit.in". Do not open tickets in regard of password-related problems, because there's nothing i can do about this :(

Disclaimer

This project can only be used for educational purposes. Using this software against target systems without prior permission is illegal, and any damages from misuse of this software will not be the responsibility of the author.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].