Notes about reverse engineering the Petya2017 ransomware
☆20Jul 6, 2017Updated 8 years ago
Alternatives and similar repositories for petya2017_notes
Users that are interested in petya2017_notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- BlackWorm SRC Extract☆17Dec 24, 2016Updated 9 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆33May 7, 2024Updated 2 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows Ransomware PoC☆15Dec 22, 2019Updated 6 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- A browser based bitcoin miner☆16Dec 15, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆22Oct 18, 2023Updated 2 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Ransomware is a project written in .Net and shows how ransomeware generally works. This repository should be used for educational reasons…☆34Jan 9, 2025Updated last year
- ☆46Apr 28, 2026Updated 3 weeks ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Clang-based tool to dump type information (enums, records, vtables) from a C++ codebase and optionally import it into IDA☆31Jun 21, 2022Updated 3 years ago
- Extract the original ransomware binary from an NSIS installer☆18Mar 22, 2017Updated 9 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 8 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 8 years ago
- XrefGen is a professional-grade cross-reference generator that detects indirect references and complex control-flow patterns that IDA Pro…☆31Feb 1, 2026Updated 3 months ago
- ☆22Jul 6, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- ☆11Aug 14, 2021Updated 4 years ago
- Silent file loader☆14Apr 24, 2022Updated 4 years ago
- mac changer and tor re-starter this script restart tor service every 17 sec!☆16Apr 24, 2022Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago