gentilkiwi / wanadecryptLinks
A decryptor for Wanacry (you need the private key!)
☆183Updated 8 years ago
Alternatives and similar repositories for wanadecrypt
Users that are interested in wanadecrypt are comparing it to the libraries listed below
Sorting:
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- Windows Remote Post Breach Tool via Telegram☆133Updated 7 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆225Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆233Updated 6 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 10 years ago
- Public repository for improvements to the EXTRABACON exploit☆162Updated 8 years ago
- ☆165Updated 8 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆152Updated 6 years ago
- Clone of hidden tear written in C++☆70Updated 4 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆179Updated 2 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- Various PoCs☆490Updated 5 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- EternalRocks worm☆460Updated 8 years ago
- Miscellaneous tools and patches that I have written/hacked/forked over the years☆64Updated 13 years ago
- MS17-010 Research☆96Updated 8 years ago
- Removed according to regulations☆35Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆267Updated 8 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 5 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆175Updated 7 years ago
- Wolves Among the Sheep☆147Updated last year
- Open source exploit framework made in C#☆54Updated 6 months ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆180Updated 8 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆176Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago