Happyholic1203 / ransomcareLinks
Crypto ransomware detection & prevention
☆18Updated 8 years ago
Alternatives and similar repositories for ransomcare
Users that are interested in ransomcare are comparing it to the libraries listed below
Sorting:
- Cryptowall Tooling & Information☆35Updated 9 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Scapy docs, examples, scripts and other stuff☆40Updated 10 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Just a collection of scripts☆40Updated 5 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- ☆63Updated 12 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Projects and POCs☆60Updated 11 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- CVE-2016-2776☆27Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- A python script used to parse the SAM registry hive.☆74Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Local privilege escalation scripts and tools☆17Updated 8 years ago