arosenmund / defcon32_dissecting_defeating_ransomwares_evasionView external linksLinks
Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32
☆17Aug 9, 2024Updated last year
Alternatives and similar repositories for defcon32_dissecting_defeating_ransomwares_evasion
Users that are interested in defcon32_dissecting_defeating_ransomwares_evasion are comparing it to the libraries listed below
Sorting:
- self-hosted Azure OSINT tool☆32Jun 24, 2025Updated 7 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- Open source Amstrad CPC6128 replica based on modern technologies and the A520EX modifications☆11Oct 5, 2025Updated 4 months ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Code in the Book!☆11Oct 15, 2018Updated 7 years ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 9 months ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- ☆42Dec 24, 2024Updated last year
- Example AIDL service and client☆11Nov 30, 2021Updated 4 years ago
- Quickly manage DNS records for domains owned within GoDaddy, Namecheap and Route53☆11Jul 19, 2021Updated 4 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 8 months ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve☆15Jul 16, 2022Updated 3 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- Rerousces related to time-travel debugging (TTD)☆30Jan 6, 2026Updated last month
- ☆11Apr 12, 2025Updated 10 months ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- CodeMash 2023 - resources for Automating Almost All Application Security Things with CI/CD -- Even Honeypots!☆13Jan 12, 2023Updated 3 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- Dataset fingerprinting for AIBOM☆15Updated this week
- Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Inclu…☆20Dec 26, 2025Updated last month
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 9 years ago
- ☆16Feb 17, 2025Updated last year
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- This is a mini ransomware made with python o/☆13Oct 6, 2021Updated 4 years ago
- All Cryptography Algorithms are implemented in C.☆13Mar 28, 2021Updated 4 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 3 months ago
- ☆16May 29, 2024Updated last year
- MiniEDR is a kernel-mode process monitor that logs creations & terminations via a named pipe. Built for research & learning, exploring Wi…☆18Feb 19, 2025Updated 11 months ago
- FunctionID databases for Ghidra to recover function symbols with from stripped binaries☆14Jun 19, 2024Updated last year
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- ☆11Jul 16, 2022Updated 3 years ago
- python3 version of cloacked-pixel.☆11Oct 8, 2022Updated 3 years ago