Cisco-Talos / TeslaDecrypt
Decryption Tool
☆142Updated 6 years ago
Alternatives and similar repositories for TeslaDecrypt:
Users that are interested in TeslaDecrypt are comparing it to the libraries listed below
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆53Updated 6 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Interactive remote PowerShell Payload☆76Updated 9 years ago
- ☆230Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆26Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆89Updated last month
- VirusTotal tools☆90Updated 4 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Open source exploit framework made in C#☆54Updated 3 months ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 9 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Exploit repository☆198Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆20Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆32Updated 9 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 8 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆66Updated 10 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Scripts created by MRG Effitas☆42Updated 8 years ago
- Decryptor for the TeslaCrypt malware☆177Updated 7 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆48Updated 7 years ago
- Yet another AV evasion tool☆119Updated 3 years ago