CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware
☆15Jul 2, 2020Updated 5 years ago
Alternatives and similar repositories for cry-decryptor
Users that are interested in cry-decryptor are comparing it to the libraries listed below
Sorting:
- The pattern matching swiss knife☆16Oct 28, 2019Updated 6 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Docker + WSGI-Python3-Flask-Eve + MongoDB : Restful API MicroService☆12May 10, 2021Updated 4 years ago
- ☆12May 6, 2021Updated 4 years ago
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago
- This script will scrape LinkedIn based on company IDs and will return ALL names associated with the searcht. You can then take these name…☆15Nov 11, 2022Updated 3 years ago
- Some Snippets for Frida☆15Feb 27, 2021Updated 5 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- Experimental Tor-based P2P Messaging and File Exchange☆21Aug 13, 2010Updated 15 years ago
- A library for detecting swapped arguments in function calls, and a Clang Static Analyzer plugin used to demonstrate the library.☆21Sep 22, 2020Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- A small collection of scripts I use when reversing mobile applications.☆21May 1, 2020Updated 5 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- A guide to call spoofing☆23Dec 16, 2023Updated 2 years ago
- Apk infector && Frida injector☆23Jul 25, 2024Updated last year
- Tools, scripts, demos, and other goodies for the Reko decompiler☆17Oct 2, 2025Updated 5 months ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- Limited parsing of IEC61850 MMS mappings for scapy.☆12Oct 31, 2023Updated 2 years ago
- Eclectic ICS (Industrial Control Systems) Resources & References☆16May 7, 2021Updated 4 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- Hierarchical key value lookup plugin for Consul Template☆12Mar 22, 2024Updated 2 years ago
- (dead/2006) The old ZDL.☆11Jan 21, 2011Updated 15 years ago
- An analyzer of JNI code that matches native code information with Java code☆23Nov 12, 2021Updated 4 years ago
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- various scripts and tools☆13Nov 23, 2025Updated 4 months ago
- Docker container to use blutter (dart decompiler for android apps)☆22Sep 18, 2024Updated last year
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106May 27, 2020Updated 5 years ago
- Xtbl Ransomware Decrypt Tool☆13Jun 9, 2016Updated 9 years ago
- Small Incompatible Timesharing System☆12Nov 23, 2022Updated 3 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Library and tools to access the Mac OS disk image formats☆22Dec 18, 2025Updated 3 months ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- ☆18Aug 13, 2020Updated 5 years ago
- ROM dump of the MYK82 chip in a Fortezza Card. Successor to the Clipper Chip.☆14Jul 28, 2024Updated last year