eset / cry-decryptorLinks
CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware
☆15Updated 5 years ago
Alternatives and similar repositories for cry-decryptor
Users that are interested in cry-decryptor are comparing it to the libraries listed below
Sorting:
- Ghidra plugin to communicate with radare2☆68Updated 2 months ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- FinSpy for Android technical analysis and tools☆60Updated 5 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆234Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Updated 4 years ago
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆123Updated 5 years ago
- Frida script to bypass ssl Pinning☆45Updated 4 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106Updated 5 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆61Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- macOS Privilege Escalation Helper☆143Updated 11 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Patches those pesky APKs for proxy use.☆50Updated 5 years ago
- Frida FDE bruteforce Samsung S7 Edge☆50Updated 6 years ago
- SSD Challenges☆48Updated 3 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 6 years ago
- A simple tool to convert the IP to a DWORD IP☆143Updated 3 years ago
- Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest☆227Updated last year
- ☆36Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- ☆29Updated 5 years ago
- Created by David Maloney via the GitHub Connector☆12Updated 6 months ago
- A git history of Windows filesystems☆77Updated 5 years ago
- ☆104Updated 4 years ago
- A tool pulls loaded binaries ordered by memory regions☆35Updated 6 years ago