Decryption Tool
☆147Mar 4, 2019Updated 7 years ago
Alternatives and similar repositories for TeslaDecrypt
Users that are interested in TeslaDecrypt are comparing it to the libraries listed below
Sorting:
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- The old integrity check bypass made by dude719.☆13Apr 2, 2016Updated 9 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- MBR manipulation tool☆18Jan 13, 2014Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Decryptor for the TeslaCrypt malware☆178Dec 28, 2017Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- DiskCryptor - Open source partition encryption solution☆42Jan 26, 2014Updated 12 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Nov 4, 2012Updated 13 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- ☆31May 10, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Filters for HTTP requests☆20Dec 2, 2015Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago