gentilkiwi / wanadecrypt
A decryptor for Wanacry (you need the private key!)
☆181Updated 7 years ago
Alternatives and similar repositories for wanadecrypt:
Users that are interested in wanadecrypt are comparing it to the libraries listed below
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Various PoCs☆490Updated 5 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆224Updated 6 years ago
- tool to extract passwords from TeamViewer memory using Frida☆462Updated 6 years ago
- UAC 0day, all day!☆277Updated 7 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆362Updated 10 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆148Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Windows Remote Post Breach Tool via Telegram☆132Updated 7 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆224Updated 7 years ago
- Automated wanadecrypt with key recovery if lucky☆790Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆237Updated last year
- EternalRocks worm☆453Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- ☆127Updated 9 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆326Updated 8 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Updated 9 years ago
- Forward local or remote tcp ports through SMB pipes.☆294Updated 4 years ago
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆295Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 5 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆179Updated 7 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Powershell VNC injector☆334Updated 4 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- random powershell goodness☆442Updated 3 months ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- Fancy Bear Source Code☆261Updated 8 years ago