adamcaudill / CurveLock
☆19Updated this week
Related projects: ⓘ
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆38Updated 10 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- See my shmoocon talk repo for updated code:☆25Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 7 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- A collection of tools mostly written in Python.☆15Updated 9 years ago
- ☆52Updated this week
- ☆12Updated 7 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆41Updated 7 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 10 years ago
- ☆14Updated this week
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 7 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆29Updated 9 years ago
- Application for random attack on Green Petya's key☆22Updated 7 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 8 years ago
- [Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.☆30Updated 7 years ago
- ☆24Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- You'll never take me alive.☆86Updated 10 years ago
- ☆21Updated 10 years ago