hasherezade / decryptors_archive
Archive of ransomware decryptors
☆29Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for decryptors_archive
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- CAPE monitor DLLs☆38Updated 4 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- ☆21Updated 3 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 2 months ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- The Grum Spam Bot☆20Updated 9 years ago
- Discover TimeDateStamps In PE File☆16Updated 8 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆55Updated 5 years ago
- Various Crypter Project☆51Updated 10 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆32Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- ☆32Updated 6 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 13 years ago
- PoC for detecting and dumping process hollowing code injection☆50Updated 6 years ago
- Common Malware Techniques☆13Updated last year
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 6 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Decoders for 7ev3n ransomware☆14Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Flare-On solutions☆36Updated 5 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆54Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆75Updated 9 years ago