gentilkiwi / wanadecryptLinks
A decryptor for Wanacry (you need the private key!)
☆183Updated 8 years ago
Alternatives and similar repositories for wanadecrypt
Users that are interested in wanadecrypt are comparing it to the libraries listed below
Sorting:
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆176Updated 9 years ago
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆225Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆241Updated 7 years ago
- Public repository for improvements to the EXTRABACON exploit☆162Updated 9 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 7 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆180Updated 8 years ago
- EternalRocks worm☆465Updated 8 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 10 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Updated 3 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Various PoCs☆492Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆246Updated 11 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- A General Purpose DLL & Code Injection Utility☆157Updated 7 years ago
- ☆165Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- MS17-010 Research☆96Updated 8 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 7 years ago
- BlackNurse attack PoC☆176Updated 9 years ago
- A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissio…☆310Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆265Updated 8 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆199Updated 8 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Updated 10 years ago