Cisco-Talos / pylocky_decryptorLinks
☆70Updated 6 years ago
Alternatives and similar repositories for pylocky_decryptor
Users that are interested in pylocky_decryptor are comparing it to the libraries listed below
Sorting:
- pentest toolbox☆28Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 5 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- ☆18Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Various Crypter Project☆9Updated 11 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago