gentilkiwi / wanadecrypt
A decryptor for Wanacry (you need the private key!)
☆181Updated 7 years ago
Alternatives and similar repositories for wanadecrypt:
Users that are interested in wanadecrypt are comparing it to the libraries listed below
- Various PoCs☆491Updated 5 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Updated 2 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Updated 6 years ago
- tool to extract passwords from TeamViewer memory using Frida☆463Updated 6 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- Windows Remote Post Breach Tool via Telegram☆133Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 9 years ago
- UAC 0day, all day!☆278Updated 7 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆227Updated 6 years ago
- ☆127Updated 9 years ago
- Powershell VNC injector☆337Updated 4 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆363Updated 10 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Updated 2 years ago
- Cross Platform Malware Development Framework☆68Updated 9 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- EternalRocks worm☆458Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- MS17-010 Research☆94Updated 7 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆194Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Updated 6 years ago