eset / cry-decryptorLinks
CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware
☆15Updated 4 years ago
Alternatives and similar repositories for cry-decryptor
Users that are interested in cry-decryptor are comparing it to the libraries listed below
Sorting:
- ☆51Updated 2 years ago
- FinSpy for Android technical analysis and tools☆54Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- Modern Binary Exploitation write-ups.☆4Updated 5 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- ☆36Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- My malware analysis code snippets☆27Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 3 years ago
- A tool to find/download malware samples from various public repositories☆12Updated 3 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- ☆50Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- I'll post some malware analysis from time to time.☆24Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Technical Write-ups for the cyber security challenges on the web today☆15Updated 8 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆49Updated 4 months ago
- Exploits for Dell EMC RecoverPoint enterprise data protection platform☆13Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆107Updated 5 years ago
- Anubis Malware Samples☆19Updated 3 years ago
- ☆14Updated 3 years ago
- Organise and access data collected during internal network pentests☆10Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago