A utility for playing with cryptography, geared towards ransomware analysis.
☆331Aug 13, 2025Updated 8 months ago
Alternatives and similar repositories for CryptoTester
Users that are interested in CryptoTester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 2 months ago
- A dynamic unpacking tool☆152Sep 17, 2023Updated 2 years ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 2 months ago
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆248Aug 2, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆168Aug 23, 2024Updated last year
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆859Feb 2, 2024Updated 2 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆683Nov 9, 2023Updated 2 years ago
- ☆128Mar 7, 2026Updated last month
- ☆20Jul 23, 2023Updated 2 years ago
- de4dot fixed to handle "anti-de4dot" interface adder☆33Jun 6, 2020Updated 5 years ago
- Now You See Me, Now You Don't☆1,042Jan 23, 2026Updated 2 months ago
- For when DLLMain is the only way☆426Oct 29, 2024Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Threadless Process Injection through entry point hijacking☆352Sep 10, 2024Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆167Aug 2, 2023Updated 2 years ago
- Research on code virtualization in .NET [WIP]☆210Jun 20, 2023Updated 2 years ago
- RozDll by ROZBUD is a Powerful Reverse Engineering Tool that creates Hijacked DLLs and Standard Patchers. RozDll Is used In Software Veri…☆75Sep 14, 2025Updated 7 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- ☆13Jul 29, 2024Updated last year
- Terminate AV/EDR Processes using kernel driver☆354Jun 12, 2023Updated 2 years ago
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆138Mar 3, 2025Updated last year
- x64 binary obfuscator☆1,968Jul 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Think APIMonitor, but for .NET binaries.☆61Feb 22, 2023Updated 3 years ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,806Updated this week
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- ☆289Jul 20, 2023Updated 2 years ago
- Retrieve inner payloads from Donut samples☆125Mar 12, 2026Updated last month
- A x64dbg plugin for quickly locating key functions.☆217May 1, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆141Feb 27, 2023Updated 3 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- IDA Python scripts☆42Apr 11, 2025Updated last year
- Simple tool to extract and decompress embedded resources processed by Fody Costura☆78Jul 10, 2024Updated last year
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,255Dec 11, 2023Updated 2 years ago