Happyholic1203 / ransomcareLinks
Crypto ransomware detection & prevention
☆19Updated 9 years ago
Alternatives and similar repositories for ransomcare
Users that are interested in ransomcare are comparing it to the libraries listed below
Sorting:
- Cryptowall Tooling & Information☆35Updated 9 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Detect sandbox by cursor movement speed☆52Updated 2 years ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 7 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- Sublime Malware Research Tool☆66Updated 9 months ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 9 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Updated 9 years ago
- Malware Control Monitor☆87Updated 10 years ago
- A warehouse for your malware☆133Updated 12 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- Malware.lu tools☆63Updated 11 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- ☆74Updated 3 years ago
- ☆86Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- ☆112Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 6 years ago
- Attack Knowledge Base☆100Updated 8 years ago
- URLCrazy☆31Updated 12 years ago
- EQGRP-Free-Files here.,☆45Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 10 years ago
- ☆68Updated 8 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago