Cisco-Talos / TeslaDecryptLinks
Decryption Tool
☆145Updated 6 years ago
Alternatives and similar repositories for TeslaDecrypt
Users that are interested in TeslaDecrypt are comparing it to the libraries listed below
Sorting:
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Distributed wrapper around oclHashcat☆89Updated 2 months ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- general purpose and malware specific analysis tools☆102Updated 9 years ago
- ☆230Updated 9 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- This is a copy of the Registry Decoder repository from Google Code.☆27Updated 9 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 2 months ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆66Updated 10 years ago
- VirusTotal tools☆91Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- A honeypot for malware that propagates via USB storage devices☆97Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Exploit repository☆197Updated 9 years ago
- Open source exploit framework made in C#☆54Updated 4 months ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 9 years ago
- Automatically exported from code.google.com/p/jsunpack-n☆165Updated 10 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- MantaRay Automated Computer Forensic Triage Tool☆64Updated 6 years ago
- A repository of tools and scripts related to malware analysis☆248Updated 8 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 8 years ago
- ☆128Updated 9 years ago
- Common components for RCS backend☆134Updated 9 years ago