A utility for playing with cryptography, geared towards ransomware analysis.
☆330Aug 13, 2025Updated 8 months ago
Alternatives and similar repositories for CryptoTester
Users that are interested in CryptoTester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 3 months ago
- A dynamic unpacking tool☆153Sep 17, 2023Updated 2 years ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 3 months ago
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆248Aug 2, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆169Aug 23, 2024Updated last year
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆860Feb 2, 2024Updated 2 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆686Nov 9, 2023Updated 2 years ago
- ☆128Apr 26, 2026Updated last week
- ☆20Jul 23, 2023Updated 2 years ago
- de4dot fixed to handle "anti-de4dot" interface adder☆33Jun 6, 2020Updated 5 years ago
- Now You See Me, Now You Don't☆1,048Jan 23, 2026Updated 3 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- For when DLLMain is the only way☆431Oct 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Threadless Process Injection through entry point hijacking☆353Sep 10, 2024Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆167Aug 2, 2023Updated 2 years ago
- Research on code virtualization in .NET [WIP]☆211Jun 20, 2023Updated 2 years ago
- RozDll by ROZBUD is a Powerful Reverse Engineering Tool that creates Hijacked DLLs and Standard Patchers. RozDll Is used In Software Veri…☆76Sep 14, 2025Updated 7 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆226Jul 25, 2023Updated 2 years ago
- ☆14Jul 29, 2024Updated last year
- Terminate AV/EDR Processes using kernel driver☆354Jun 12, 2023Updated 2 years ago
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆138Mar 3, 2025Updated last year
- x64 binary obfuscator☆1,971Jul 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Think APIMonitor, but for .NET binaries.☆61Feb 22, 2023Updated 3 years ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,819Apr 16, 2026Updated 2 weeks ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Retrieve inner payloads from Donut samples☆127Mar 12, 2026Updated last month
- ☆291Jul 20, 2023Updated 2 years ago
- A x64dbg plugin for quickly locating key functions.☆219May 1, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆244Sep 26, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆142Feb 27, 2023Updated 3 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- IDA Python scripts☆42Apr 11, 2025Updated last year
- Simple tool to extract and decompress embedded resources processed by Fody Costura☆79Jul 10, 2024Updated last year
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,258Dec 11, 2023Updated 2 years ago