gentilkiwi / wanadecryptLinks
A decryptor for Wanacry (you need the private key!)
☆183Updated 8 years ago
Alternatives and similar repositories for wanadecrypt
Users that are interested in wanadecrypt are comparing it to the libraries listed below
Sorting:
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆236Updated 6 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆162Updated 8 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆225Updated 8 years ago
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 10 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissio…☆309Updated 7 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆178Updated 2 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆177Updated 5 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- EternalRocks worm☆462Updated 8 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆199Updated 8 years ago
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆52Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- Various PoCs☆492Updated 5 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Updated 10 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- ☆165Updated 8 years ago
- ☆129Updated 10 years ago
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- UAC 0day, all day!☆280Updated 8 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆176Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆244Updated 11 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 8 years ago