Notes about reverse engineering the Petya2017 ransomware
☆20Jul 6, 2017Updated 8 years ago
Alternatives and similar repositories for petya2017_notes
Users that are interested in petya2017_notes are comparing it to the libraries listed below
Sorting:
- Wakxy is a Wakfu packet sniffer (MITM). Written in C++/Qt with Javascript scripting support.☆20Sep 15, 2017Updated 8 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Windows Ransomware PoC☆15Dec 22, 2019Updated 6 years ago
- ☆35Sep 25, 2020Updated 5 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- A browser based bitcoin miner☆16Dec 15, 2013Updated 12 years ago
- ☆22Oct 18, 2023Updated 2 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Automated cryptocurrency bot that uses market metrics and machine learning to make trades☆12Oct 19, 2020Updated 5 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- Ransomware is a project written in .Net and shows how ransomeware generally works. This repository should be used for educational reasons…☆33Jan 9, 2025Updated last year
- ☆13Sep 26, 2020Updated 5 years ago
- ☆46Jan 30, 2024Updated 2 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Clang-based tool to dump type information (enums, records, vtables) from a C++ codebase and optionally import it into IDA☆30Jun 21, 2022Updated 3 years ago
- Extract the original ransomware binary from an NSIS installer☆18Mar 22, 2017Updated 9 years ago
- Hax That F#uck Html Page☆10Mar 13, 2018Updated 8 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 7 years ago
- Mines bitcoin in the browser using WebGL to compute the hashes and a server to negotiate the stratum mining protocol and coordinate clien…☆20Mar 18, 2022Updated 4 years ago
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- Silent file loader☆14Apr 24, 2022Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago