Happyholic1203 / ransomcare
Crypto ransomware detection & prevention
☆17Updated 8 years ago
Alternatives and similar repositories for ransomcare:
Users that are interested in ransomcare are comparing it to the libraries listed below
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- ☆74Updated 2 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- Torified Cuckoo malware analyser in a Docker container with VirtualBox☆2Updated 7 years ago
- Just a collection of scripts☆40Updated 4 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- ☆2Updated 9 months ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Malware Behavior Analyzer☆159Updated 7 years ago
- Why hunt when you can seine?☆21Updated 9 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Detect sandbox by cursor movement speed☆52Updated 2 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- A x86 systematic ROP payload generation☆57Updated 4 years ago