Demonslay335 / hidden-tear-bruteforcerView external linksLinks
Simple bruteforcer for EDA2/HiddenTear based ransomware.
☆27May 14, 2016Updated 9 years ago
Alternatives and similar repositories for hidden-tear-bruteforcer
Users that are interested in hidden-tear-bruteforcer are comparing it to the libraries listed below
Sorting:
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Jan 7, 2016Updated 10 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- A CRUD-Application for managing WireGuard peers (e.g. for dynamic peer management) - WiP☆13Jun 20, 2018Updated 7 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- A library to get songs directly from Spotify.☆13Jun 20, 2022Updated 3 years ago