Really can protect from ransomware encryption?
☆15Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for Encrypt-Delete-Test
Users that are interested in Encrypt-Delete-Test are comparing it to the libraries listed below
Sorting:
- Java Cheat Sheet : Comprehensive Java Programming Guide With Mini Projects | Best for people, who are coming from other programming langu…☆18Apr 19, 2020Updated 5 years ago
- A Tools For Spoon (https://spooncast.net), to Increase Tap Love, Fans, Viewers Of Fans, Report, and etc.☆10Nov 9, 2022Updated 3 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- AntiRansomware Linux Kernel Module☆37May 25, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- JEI/REI/EMI plugin that displays breeding information☆13Feb 8, 2026Updated last month
- Take control of your friends wallpapers☆14Mar 11, 2024Updated last year
- A simple way of sending messages from the CLI output to your Discord channel with webhook.☆36Mar 2, 2022Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated 3 weeks ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- Core animation code for GeckoLib. This is a plain old java library, no dependence on minecraft or a specific mod loader.☆12Dec 3, 2023Updated 2 years ago
- XDP Based Lightweight and Fast Firewall☆60Feb 23, 2026Updated 2 weeks ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Updated repository of the webcam headtracker☆14Mar 12, 2023Updated 2 years ago
- Completely strips digital signatures from executables (.exe, .dll, .sys, .drv...) and fixes issues preventing resigning☆17Oct 19, 2025Updated 4 months ago
- Logr - logging and metrics service☆14Jul 6, 2025Updated 8 months ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Encrypt your git repo...☆50Jun 16, 2022Updated 3 years ago
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- Simple online color-picker tool☆10Oct 22, 2016Updated 9 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- ☆12Nov 10, 2022Updated 3 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Take control of your friends wallpapers☆13Jun 11, 2025Updated 8 months ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- ☆10Jul 24, 2023Updated 2 years ago
- A Proposed new backend for PolyMC's instance management system☆10Oct 19, 2022Updated 3 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- A simple implementation of the Karatsuba multiplication algorithm☆11Apr 2, 2025Updated 11 months ago
- ☆10Nov 24, 2018Updated 7 years ago
- Golang logger to different configurable writers.☆12Dec 27, 2020Updated 5 years ago
- A detailed implementation of the TrueSkill algorithm in the Java language.☆11Sep 5, 2015Updated 10 years ago
- A modular, scalable, fast and reliable phishing detection framework☆11Dec 1, 2018Updated 7 years ago
- A prototype deobfuscator for string encryption applied by stringer.☆12Sep 18, 2020Updated 5 years ago