A decryptor for systems infected by Avaddon ransomware.
☆25Oct 29, 2024Updated last year
Alternatives and similar repositories for AvaddonDecryptor
Users that are interested in AvaddonDecryptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jun 5, 2019Updated 6 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- ☆24Apr 10, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- ☆10Dec 9, 2018Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- ida python scripts☆23Jul 23, 2018Updated 7 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Aug 4, 2021Updated 4 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一个简陋的分布式子域名扫描轮子☆17Dec 8, 2022Updated 3 years ago
- Apply YARA rules to your Cutter projects.☆16Jan 7, 2020Updated 6 years ago
- ☆16Jul 11, 2021Updated 4 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 4 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆39Sep 23, 2022Updated 3 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- 遇见扫描器☆16May 15, 2022Updated 3 years ago
- uuid-shellcode-execution☆13May 9, 2021Updated 4 years ago
- A new idea to build an anti ransomware☆23Oct 4, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Sep 1, 2021Updated 4 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- ☆11Mar 2, 2024Updated 2 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- 利用阿里的云函数发送电子邮件☆22Dec 20, 2021Updated 4 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 8 months ago
- ☆35Oct 29, 2021Updated 4 years ago
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- This program detects all present and future ransomware in Windows file shares or local drives for Windows file servers. I created this w…☆19Dec 18, 2023Updated 2 years ago
- ☆12Sep 13, 2023Updated 2 years ago
- A fast, flexible, and fun blog app. Also, an easy-to-learn web development framework. Written in newLISP.☆19Feb 28, 2025Updated last year
- A Keylogger written in AutoIt☆12May 26, 2014Updated 11 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago