hasherezade / petya_key
A decoder for Petya victim keys, using the Janus' masterkey.
☆52Updated 2 years ago
Alternatives and similar repositories for petya_key:
Users that are interested in petya_key are comparing it to the libraries listed below
- A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.☆20Updated 10 years ago
- Archive of ransomware decryptors☆29Updated 7 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆20Updated 5 years ago
- Free Malware Samples☆16Updated 7 years ago
- Citadel 1.3.5.1☆28Updated 11 years ago
- Power Loader botnet☆39Updated 9 years ago
- Tinba Banking Trojan☆83Updated 9 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Malwares are here☆23Updated 2 weeks ago
- Malware captured with honeypots☆35Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- ☆26Updated 7 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆45Updated 7 years ago
- a "process-less" trojan☆12Updated 4 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆33Updated 8 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆23Updated 6 years ago
- MBR virus☆21Updated 3 years ago
- ☆10Updated last year
- Fileless Ransomware Example☆35Updated 7 years ago
- Windows XP 32-Bit Bootkit☆144Updated 10 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆142Updated last year
- Application for cracking Red Petya key based on genetic algorithms.☆52Updated 2 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- History and analysis of Windows desktop images☆17Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago