HIBC2017 / WANNAFIX
WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack
☆53Updated 6 years ago
Alternatives and similar repositories for WANNAFIX
Users that are interested in WANNAFIX are comparing it to the libraries listed below
Sorting:
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- ☆48Updated 9 years ago
- MS17-010 Windows SMB RCE -- Full subnet scanner☆24Updated 8 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆37Updated 8 years ago
- Powershell tool to download malware samples.☆12Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- ☆59Updated 6 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.☆42Updated 7 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- Interactive remote PowerShell Payload☆76Updated 9 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago