aguinet / petya2017_notesLinks
Notes about reverse engineering the Petya2017 ransomware
☆20Updated 8 years ago
Alternatives and similar repositories for petya2017_notes
Users that are interested in petya2017_notes are comparing it to the libraries listed below
Sorting:
- ☆13Updated 9 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- ☆36Updated 6 years ago
- Power Loader botnet☆42Updated 10 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆21Updated 8 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- ☆65Updated 8 years ago
- ☆24Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 12 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- Fake msxfs.dll to debug ATM trojans☆54Updated 10 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- ☆29Updated 9 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 6 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆24Updated 6 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- DLL Injection Library & Tools☆72Updated 9 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago