aguinet / petya2017_notesLinks
Notes about reverse engineering the Petya2017 ransomware
☆20Updated 8 years ago
Alternatives and similar repositories for petya2017_notes
Users that are interested in petya2017_notes are comparing it to the libraries listed below
Sorting:
- Decoders for 7ev3n ransomware☆17Updated 8 years ago
- Power Loader botnet☆42Updated 10 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆13Updated 8 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆36Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- ☆65Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Mass malicious script dump/Malware src dump☆16Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆21Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Updated 9 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- ☆27Updated 8 years ago
- ☆29Updated 8 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- Various Crypter Project☆10Updated 11 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago