Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32
☆17Aug 9, 2024Updated last year
Alternatives and similar repositories for defcon32_dissecting_defeating_ransomwares_evasion
Users that are interested in defcon32_dissecting_defeating_ransomwares_evasion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆16Jan 31, 2024Updated 2 years ago
- Rerousces related to time-travel debugging (TTD)☆36Jan 6, 2026Updated 2 months ago
- ☆11Dec 17, 2024Updated last year
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 2 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 6 months ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- ☆18May 3, 2024Updated last year
- SANS Slingshot Linux Distribution☆56Nov 2, 2020Updated 5 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 5 months ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- FunctionID databases for Ghidra to recover function symbols with from stripped binaries☆15Jun 19, 2024Updated last year
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 7 months ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Repository to put my notes related to OSCP certification☆26Aug 29, 2019Updated 6 years ago
- RNNs for sql-injection detection 🔍. built in python with tensorflow and keras☆12Sep 14, 2024Updated last year
- ☆42Dec 24, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- python3 version of cloacked-pixel.☆11Oct 8, 2022Updated 3 years ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆98Sep 10, 2025Updated 6 months ago
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆33Mar 26, 2026Updated last week
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Web Classification and Reputation | IP Reputation | Real-Time Anti-Phishing | Streaming Malware Detection | File Reputation | Mobile Secu…☆26Jun 21, 2019Updated 6 years ago
- ☆16May 29, 2024Updated last year
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- some sploits☆19Sep 20, 2024Updated last year
- ☆23May 24, 2024Updated last year
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆42Jan 20, 2026Updated 2 months ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago