This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.
☆17Mar 3, 2017Updated 9 years ago
Alternatives and similar repositories for Ransomware-Decryptor-List
Users that are interested in Ransomware-Decryptor-List are comparing it to the libraries listed below
Sorting:
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- All-in-One Ransomware Decryption Tools (Unofficial Mirror)☆53Aug 21, 2021Updated 4 years ago
- Ransomeware attack in linux☆14Aug 12, 2018Updated 7 years ago
- Source Code of Jigsaw Ransomware Created in Vb.Net☆20Mar 16, 2018Updated 7 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Oct 17, 2023Updated 2 years ago
- A Lightweight Malware Configuration Parsing Tool☆15Nov 6, 2019Updated 6 years ago
- ☆13Aug 27, 2017Updated 8 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆14Apr 1, 2015Updated 10 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆20Jan 16, 2019Updated 7 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- FUD Linux Ransomware☆14Jan 12, 2023Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- PewCrypt Ransomware Source☆59Mar 22, 2019Updated 6 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- A library to encrypt / decrypt with AES (Rijndael) between C# Net Core and JavaScript and securely hash with Scrypt☆20Dec 8, 2022Updated 3 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- Python Remote Administration Tool With GUI☆18Jun 6, 2023Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆23Apr 27, 2025Updated 10 months ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆95Feb 19, 2021Updated 5 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 4 years ago