A decryptor for systems infected by Avaddon ransomware.
☆25Oct 29, 2024Updated last year
Alternatives and similar repositories for AvaddonDecryptor
Users that are interested in AvaddonDecryptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jun 5, 2019Updated 6 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- ☆10Aug 9, 2024Updated last year
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- Este instalador instalará Metasploit en termux solucionando el error de ruby 3.0.0☆12Apr 29, 2021Updated 4 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- ☆10Dec 9, 2018Updated 7 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- 一个简陋的分布式子域名扫描轮子☆17Dec 8, 2022Updated 3 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- Apply YARA rules to your Cutter projects.☆16Jan 7, 2020Updated 6 years ago
- ☆16Jul 11, 2021Updated 4 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆39Sep 23, 2022Updated 3 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- A new idea to build an anti ransomware☆24Oct 4, 2020Updated 5 years ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Sep 1, 2021Updated 4 years ago
- scrapy website Article and link ...☆15Dec 13, 2020Updated 5 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 8 months ago
- Course - Developing 2D Games☆14Jul 27, 2021Updated 4 years ago
- ☆11Mar 2, 2024Updated 2 years ago
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- 利用阿里的云函数发送电子邮件☆22Dec 20, 2021Updated 4 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 7 months ago
- Visually diff websites☆20Jan 22, 2018Updated 8 years ago