Cisco-Talos / TeslaDecryptLinks
Decryption Tool
☆145Updated 6 years ago
Alternatives and similar repositories for TeslaDecrypt
Users that are interested in TeslaDecrypt are comparing it to the libraries listed below
Sorting:
- Wi-Fi Scan Visualizer by Pentester Academy☆57Updated 9 years ago
- ☆230Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- VirusTotal tools☆91Updated 4 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Distributed wrapper around oclHashcat☆90Updated 4 months ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Decryptor for the TeslaCrypt malware☆177Updated 7 years ago
- Clone of hidden tear written in C++☆70Updated 4 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- WPS related utilities☆165Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆89Updated 9 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- Interactive remote PowerShell Payload☆77Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 9 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆125Updated 4 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Updated 9 years ago