hasherezade / petya_keyLinks
A decoder for Petya victim keys, using the Janus' masterkey.
β61Updated 3 years ago
Alternatives and similar repositories for petya_key
Users that are interested in petya_key are comparing it to the libraries listed below
Sorting:
- πβπ¨ This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.β144Updated 6 months ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Managerβ¦β60Updated 8 years ago
- Malware captured with honeypotsβ38Updated 8 years ago
- β39Updated 8 years ago
- Archive of ransomware decryptorsβ34Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.β132Updated 12 years ago
- Carberp Banking Trojanβ126Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leveβ¦β70Updated 6 years ago
- Windows XP 32-Bit Bootkitβ146Updated 11 years ago
- Application for cracking Red Petya key based on genetic algorithms.β56Updated 3 years ago
- Alina Spark - Point of Sales Trojanβ48Updated 10 years ago
- β58Updated 8 years ago
- Free Malware Samplesβ17Updated 8 years ago
- Power Loader botnetβ41Updated 10 years ago
- Automated Cyber Offenseβ88Updated 6 years ago
- Windows Malware monitors and infects specific kinds of files.β18Updated 6 years ago
- Clone of hidden tear written in C++β70Updated 5 years ago
- Various Crypter Projectβ54Updated 11 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malwβ¦β91Updated 2 years ago
- The source code of the Zeus Evolution botnet that used TOR.β61Updated 8 years ago
- MALM: Malware Monitorβ49Updated 12 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.β28Updated 8 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUDβ130Updated 4 years ago
- Download all malicious files from a Kippo SSH honeypot databaseβ23Updated 11 years ago
- Easiest way to download samples through VirusTotal Intelligenceβ38Updated 8 years ago
- Set of my small utils related to cryptography, encoding, decoding etcβ94Updated 4 months ago
- Ransomeware attack in linuxβ14Updated 7 years ago
- ClipBanker Spy Trojanβ10Updated last year
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlierβ24Updated 7 years ago
- Python script to automatically deobfuscate malware codeβ59Updated 7 years ago