Dump configuration from STOP Djvu ransomware sample
☆12Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for stop_config
Users that are interested in stop_config are comparing it to the libraries listed below
Sorting:
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- ☆37Dec 10, 2018Updated 7 years ago
- A user-friendly open-source School Management/Administration Software built on PHP-MySQL☆16Jun 17, 2019Updated 6 years ago
- Capture The Flag | Cyber SEA GAME 2019 | Writeup☆12Nov 24, 2019Updated 6 years ago
- It's an RSA-cracker, that uses Fermat's factorization method to get p and q.☆15Dec 19, 2015Updated 10 years ago
- This repository contains code, manuals and notes I wrote pertaining to system programming on Linux☆12Jun 8, 2023Updated 2 years ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- Cracking RSA☆21Apr 24, 2015Updated 10 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- decrypt all of the wifi key from Old and Current interface Profile in Windows☆14Apr 8, 2020Updated 5 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malware☆19Jun 8, 2015Updated 10 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆43Dec 30, 2025Updated 2 months ago
- Scrape GrayHat Warefare for leaked code signing certificates. Outputs certificate hashes to crack with JtR☆12Nov 25, 2023Updated 2 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- IDA processor module for Renesas RX63 MCU☆14Nov 10, 2025Updated 4 months ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- md5 Bruteforce in python☆16Jan 24, 2022Updated 4 years ago
- Downloads Youtube Videos and Playlists☆21Feb 6, 2022Updated 4 years ago
- ☆61Feb 12, 2026Updated last month
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- A simple School management system using ASP.Net MVC & EF.☆21Oct 23, 2018Updated 7 years ago
- Vaccine for STOP/DJVU ransomware, prevents encryption☆25Oct 30, 2025Updated 4 months ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Portable download of Microsoft Visual C++ 4.00 command line tools. Just run bin/VCVARS32.bat in any command prompt.☆14Nov 2, 2021Updated 4 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- Download youtube videos/playlists , facebook , vimeo videos☆26Dec 8, 2022Updated 3 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- Smart Mirror for Raspberry Pi running Windows 10☆10Apr 24, 2016Updated 9 years ago
- ☆30Oct 13, 2020Updated 5 years ago
- Creating Digital Covid Vaccination Test Certificates☆13Dec 12, 2021Updated 4 years ago
- PowerShell module for configuring and managing Microsoft Always On VPN.☆20Updated this week