Simple decrypter for strings used in SamSam Ransomware samples.
☆18Feb 21, 2020Updated 6 years ago
Alternatives and similar repositories for SamSamStringDecrypter
Users that are interested in SamSamStringDecrypter are comparing it to the libraries listed below
Sorting:
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- testing123☆12Nov 23, 2024Updated last year
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- ☆13Apr 22, 2015Updated 10 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- ☆16Apr 30, 2024Updated last year
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- A simple shellcode runner☆22Apr 20, 2014Updated 11 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any …☆25Jan 11, 2021Updated 5 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 8 months ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Sep 2, 2019Updated 6 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆109Oct 30, 2019Updated 6 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated last month
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago