Decryptor for the TeslaCrypt malware
☆178Dec 28, 2017Updated 8 years ago
Alternatives and similar repositories for TeslaCrack
Users that are interested in TeslaCrack are comparing it to the libraries listed below
Sorting:
- Decryption Tool☆147Mar 4, 2019Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆38Dec 17, 2014Updated 11 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- source&exe☆38Jul 18, 2017Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Feb 8, 2019Updated 7 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Feb 18, 2016Updated 10 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆231Jan 18, 2024Updated 2 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398May 20, 2016Updated 9 years ago
- A pintool in order to unpack malware☆239Jul 30, 2016Updated 9 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- A validating recursive DNS resolver library and standalone server with DNSSEC support☆34Nov 27, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Sep 26, 2020Updated 5 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆142Apr 16, 2021Updated 4 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago