Cisco-Talos / pylocky_decryptor
☆69Updated 6 years ago
Alternatives and similar repositories for pylocky_decryptor:
Users that are interested in pylocky_decryptor are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Open-source Exploiting Framework☆29Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- ☆34Updated 3 weeks ago
- pentest toolbox☆28Updated 2 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago