gentilkiwi / wanakiwiLinks
Automated wanadecrypt with key recovery if lucky
☆793Updated 7 years ago
Alternatives and similar repositories for wanakiwi
Users that are interested in wanakiwi are comparing it to the libraries listed below
Sorting:
- Wannacry in-memory key recovery☆1,086Updated 8 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,027Updated 5 years ago
- A decryptor for Wanacry (you need the private key!)☆182Updated 8 years ago
- NSA finest tool☆982Updated 8 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,009Updated 9 years ago
- EternalRocks worm☆458Updated 8 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆510Updated 8 years ago
- an open source ransomware honeypot☆901Updated 9 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Updated 6 years ago
- Various PoCs☆491Updated 5 years ago
- ☆1,327Updated 2 years ago
- PoC for a NTFS crash that I discovered, in various Windows versions☆600Updated last year
- Cisco Talos MBR Filter Driver☆342Updated 7 years ago
- Brand New Code Injection for Windows☆730Updated 4 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆441Updated 8 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,913Updated 8 years ago
- Remote administration service which uses twitter as a command and control server☆713Updated 4 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆997Updated 6 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆324Updated 9 years ago
- powerful auto-backdooring utility☆747Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,411Updated 6 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,335Updated 6 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,846Updated 11 months ago
- Zero-Day Code Injection and Persistence Technique☆1,233Updated 2 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆913Updated 7 years ago
- wireless hacking - This is automated wireless hacking tool☆1,255Updated 2 years ago
- Python logger with multiple features.☆528Updated 3 years ago
- Pre-migration repository. New repository ➙☆861Updated 7 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆752Updated 7 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago