Cisco-Talos / TeslaDecryptLinks
Decryption Tool
☆147Updated 6 years ago
Alternatives and similar repositories for TeslaDecrypt
Users that are interested in TeslaDecrypt are comparing it to the libraries listed below
Sorting:
- Cryptowall Tooling & Information☆37Updated 9 years ago
- Distributed wrapper around oclHashcat☆91Updated 8 months ago
- VirusTotal tools☆92Updated 5 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- ☆230Updated 10 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆67Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Decryptor for the TeslaCrypt malware☆178Updated 7 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Interactive remote PowerShell Payload☆78Updated 9 years ago
- WPS related utilities☆165Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆52Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆90Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Veil Catapult is no longer supported☆75Updated 9 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Ambush Host Intrusion Prevention System☆65Updated 12 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago