alternat0r / Ransomware-Decryptor-List
This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.
☆16Updated 7 years ago
Related projects: ⓘ
- Open-source Exploiting Framework☆29Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- ☆13Updated 6 years ago
- ☆10Updated this week
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 4 years ago
- ☆25Updated this week
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- ☆14Updated this week
- ☆18Updated this week
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- ☆10Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆12Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- Collection of Nmap scripts☆10Updated 8 years ago
- Optional plugins for MITMf☆15Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- ☆10Updated this week
- Generates payloads using msfvenom and open multi handler listener☆11Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆38Updated 8 years ago
- ☆15Updated last year
- Specify targets and run sets of tools against them☆10Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- ☆12Updated 6 years ago