Cisco-Talos / pylocky_decryptor
☆69Updated 6 years ago
Alternatives and similar repositories for pylocky_decryptor:
Users that are interested in pylocky_decryptor are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 5 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆52Updated 4 years ago
- Software exploitation training material☆15Updated 7 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago