☆70Dec 4, 2018Updated 7 years ago
Alternatives and similar repositories for pylocky_decryptor
Users that are interested in pylocky_decryptor are comparing it to the libraries listed below
Sorting:
- view RedFlagDeals.com from the command line☆10Jul 6, 2024Updated last year
- ☆11Mar 22, 2016Updated 9 years ago
- Auto connect and reconnect to Mikrotik free WiFi point on DD-WRT router☆12Dec 2, 2016Updated 9 years ago
- python版挖掘鸡☆12Nov 19, 2015Updated 10 years ago
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Jul 2, 2020Updated 5 years ago
- This is a repo for android spyware☆18Mar 27, 2019Updated 6 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Feb 26, 2019Updated 7 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Simple golang shodan cli☆49Apr 1, 2021Updated 4 years ago
- ☆31Updated this week
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆26Aug 5, 2017Updated 8 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- virglrenderer fork allowing remote display targets in vtest☆11May 4, 2021Updated 4 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- Some cacti Templates I use and some that I have created☆11Jun 27, 2023Updated 2 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Script Deface Keren Dan Berkelas☆10Jun 26, 2022Updated 3 years ago
- Blender importer for DML and DPL files created by the Dagor Asset Explorer.☆14Aug 20, 2023Updated 2 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- ☆12Sep 10, 2019Updated 6 years ago
- A modular PowerShell-based application packaging framework for standardized, parameter-driven and deployment-system-independent software …☆12Oct 29, 2025Updated 4 months ago
- ☆11Aug 31, 2019Updated 6 years ago
- ARMv7 architecture plugin☆40Mar 7, 2024Updated 2 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 6 months ago
- ☆22Nov 22, 2025Updated 3 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Quickly retrieve all keys and download links of your bundle from IndieGala or Humble Bundle. This is not a hack or anything like that to …☆10Sep 2, 2019Updated 6 years ago