hasherezade / petya_green
Application for random attack on Green Petya's key
☆22Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for petya_green
- ☆28Updated 7 years ago
- ☆13Updated 7 years ago
- CVE-2014-0816☆24Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- UAC Copy Tool☆9Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆14Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆36Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 11 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- Shellcode tracer☆15Updated 8 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- Remote execution tool☆13Updated 10 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆7Updated 12 years ago
- Yet Another Repetitive Rootkit☆8Updated 11 years ago
- ☆18Updated 7 years ago
- simple rootkit for computer security class☆13Updated 11 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year