cryptolok / CryptoTrooper
rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case
☆12Updated 5 years ago
Related projects: ⓘ
- ~ BannerGrab☆26Updated 7 years ago
- ☆84Updated this week
- ☆29Updated this week
- ☆16Updated this week
- ☆51Updated this week
- ☆33Updated 8 years ago
- Projects and POCs☆58Updated 10 years ago
- ☆39Updated this week
- Post Exploitation Linux Toolkit☆33Updated 7 years ago
- RIG Exploit Kit (front end)☆30Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆38Updated 2 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- Multi-threaded SSH Password Auditor☆92Updated 10 years ago
- ☆91Updated this week
- POC of code that downloads and executes shellcode in memory.☆79Updated 10 years ago
- ☆16Updated this week
- ☆49Updated this week
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆51Updated this week
- ☆94Updated this week
- Decrypt MITM SSL RDP and save to pcap☆52Updated 10 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 9 years ago
- ☆19Updated this week
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- ☆33Updated this week
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- ☆19Updated this week