Cryptowall Tooling & Information
☆37Mar 3, 2016Updated 10 years ago
Alternatives and similar repositories for cryptowall
Users that are interested in cryptowall are comparing it to the libraries listed below
Sorting:
- ☆16Dec 26, 2022Updated 3 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆12Mar 3, 2016Updated 9 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆93Nov 21, 2016Updated 9 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago