gentilkiwi / wanadecryptLinks
A decryptor for Wanacry (you need the private key!)
☆183Updated 8 years ago
Alternatives and similar repositories for wanadecrypt
Users that are interested in wanadecrypt are comparing it to the libraries listed below
Sorting:
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆225Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆241Updated 7 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 11 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- ☆165Updated 8 years ago
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆199Updated 8 years ago
- Public repository for improvements to the EXTRABACON exploit☆162Updated 9 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Various PoCs☆492Updated 5 years ago
- EternalRocks worm☆465Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Updated 8 years ago
- A collection of tools for dealing with TrickBot☆202Updated 8 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Fancy Bear Source Code☆262Updated 8 years ago
- BlackNurse attack PoC☆176Updated 9 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆180Updated 8 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- Telnet Honeypot☆163Updated 6 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 10 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- A webshell framework for penetration testers.☆300Updated 4 months ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- ☆385Updated 13 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 7 years ago