CyberThreatAlliance / cryptowall_v3
A repository of scripts and files related to the CryptoWall version 3 threat
☆13Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for cryptowall_v3
- Cryptowall Tooling & Information☆34Updated 8 years ago
- IRMA ansible☆24Updated 7 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆32Updated 8 months ago
- zer0m0n driver for cuckoo sandbox☆21Updated 9 years ago
- Malware visualization on earth map☆40Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- IRMA frontend☆25Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 5 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- ☆12Updated 7 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 9 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 8 years ago