Dump configuration from STOP Djvu ransomware sample
☆12Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for stop_config
Users that are interested in stop_config are comparing it to the libraries listed below
Sorting:
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- research tool for the analysis of malicious pdf documents. make sure to run the installer first to get all of the 3rd party dlls installe…☆17Sep 18, 2013Updated 12 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Vaccine for STOP/DJVU ransomware, prevents encryption☆26Oct 30, 2025Updated 4 months ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- ☆17Mar 22, 2025Updated 11 months ago
- iOS malware samples☆43May 13, 2016Updated 9 years ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Custom variants for ULTRAKILL.☆12Jul 27, 2025Updated 7 months ago
- PyDelta is a Python script designed to obfuscate Python source code, making it more difficult to understand and reverse-engineer.☆13Jul 13, 2024Updated last year
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 8 years ago
- ☆14Aug 22, 2023Updated 2 years ago
- Accessibility UX checklist to serve as a method for designers and developers to assess the WCAG compliance of their work.☆16Mar 30, 2023Updated 2 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- ☆15Mar 21, 2024Updated last year
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- An XrmToolBox plugin to generate Excel documentation with CRM metadata☆10Dec 11, 2025Updated 2 months ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- ☆11Sep 8, 2025Updated 5 months ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- Linux ptrace anti-debugging demo☆43Aug 4, 2022Updated 3 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- This repository holds the sources for plugins that interface with the G'MIC library (http://gmic.eu)☆12Mar 4, 2023Updated 2 years ago
- ☆10Mar 12, 2024Updated last year
- Crafter CMS documentation☆11Feb 19, 2026Updated last week
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Discord Rich presence for QBittorrent made with .NET☆11Jul 13, 2025Updated 7 months ago