gentilkiwi / wanakiwi
Automated wanadecrypt with key recovery if lucky
☆789Updated 7 years ago
Alternatives and similar repositories for wanakiwi:
Users that are interested in wanakiwi are comparing it to the libraries listed below
- Wannacry in-memory key recovery☆1,081Updated 7 years ago
- NSA finest tool☆977Updated 7 years ago
- Various PoCs☆491Updated 5 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,025Updated 5 years ago
- A decryptor for Wanacry (you need the private key!)☆181Updated 7 years ago
- EternalRocks worm☆456Updated 7 years ago
- PoC for a NTFS crash that I discovered, in various Windows versions☆599Updated 10 months ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,899Updated 7 years ago
- Zero-Day Code Injection and Persistence Technique☆1,227Updated 2 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆224Updated 7 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆751Updated 7 years ago
- Brand New Code Injection for Windows☆727Updated 4 years ago
- ☆340Updated 8 years ago
- Cisco Talos MBR Filter Driver☆339Updated 7 years ago
- tool to extract passwords from TeamViewer memory using Frida☆462Updated 6 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,007Updated 9 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆654Updated 4 months ago
- BlackNurse attack PoC☆172Updated 8 years ago
- A webshell framework for penetration testers.☆297Updated 11 months ago
- ☆1,331Updated last year
- VirtualBox E1000 Guest-to-Host Escape☆1,406Updated 6 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆674Updated 2 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- Python logger with multiple features.☆526Updated 3 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆429Updated 2 months ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- ransomware open-sources☆762Updated 4 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆494Updated 7 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,840Updated 9 months ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆508Updated 8 years ago