hasherezade / petya_recoveryLinks
Application for cracking Red Petya key based on genetic algorithms.
☆54Updated 3 years ago
Alternatives and similar repositories for petya_recovery
Users that are interested in petya_recovery are comparing it to the libraries listed below
Sorting:
- Set of my small utils related to cryptography, encoding, decoding etc☆87Updated last year
- ☆68Updated 8 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- Your bag of handy codes for malware researchers☆121Updated 5 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Various scripts helpful in sorting collections of malware samples.☆37Updated 8 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆60Updated 10 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Updated 7 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- ☆43Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- Tinba Banking Trojan☆85Updated 10 years ago
- library to decode/parse zeus-like configuration files☆29Updated 7 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Updated 6 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- REST API based malware repository (abandoned)☆108Updated 10 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- Archive of ransomware decryptors☆30Updated 7 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago