Antelox / NemucodFRView external linksLinks
Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]
☆19Jul 5, 2016Updated 9 years ago
Alternatives and similar repositories for NemucodFR
Users that are interested in NemucodFR are comparing it to the libraries listed below
Sorting:
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- ☆22Jun 18, 2015Updated 10 years ago
- Churros is a Javascript library for sycing a local HTML 5 Web SQL Database with your server's database.☆13Feb 27, 2011Updated 14 years ago
- A more generic version of https://github.com/dataarts/armsglobe for visualizing source/destination data☆10Jul 5, 2016Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Feb 9, 2018Updated 8 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- node.js cucumber implementation for the birds☆24Jul 7, 2014Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Stochastic Traffic Factoring Utility☆15Nov 5, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Aug 17, 2021Updated 4 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Web based radio for your streaming pleasure ...☆31Mar 23, 2011Updated 14 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Aug 14, 2023Updated 2 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago