Cisco-Talos / TeslaDecryptLinks
Decryption Tool
☆146Updated 6 years ago
Alternatives and similar repositories for TeslaDecrypt
Users that are interested in TeslaDecrypt are comparing it to the libraries listed below
Sorting:
- Decryptor for the TeslaCrypt malware☆178Updated 7 years ago
- VirusTotal tools☆92Updated 4 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- ☆230Updated 9 years ago
- Clone of hidden tear written in C++☆70Updated 4 years ago
- Interactive remote PowerShell Payload☆78Updated 9 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 9 years ago
- ☆17Updated 8 years ago
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆52Updated 6 years ago
- See here:☆42Updated 12 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- Distributed wrapper around oclHashcat☆91Updated 6 months ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆67Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- a MITM attack tool☆85Updated 10 years ago
- A honeypot for malware that propagates via USB storage devices☆98Updated 10 years ago
- Tool to disable Intel AMT on Windows☆144Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- A decryptor for Wanacry (you need the private key!)☆183Updated 8 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- ☆68Updated 8 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 10 years ago