hasherezade / petya_recoveryView external linksLinks
Application for cracking Red Petya key based on genetic algorithms.
☆56Apr 14, 2022Updated 3 years ago
Alternatives and similar repositories for petya_recovery
Users that are interested in petya_recovery are comparing it to the libraries listed below
Sorting:
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆36Oct 1, 2022Updated 3 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- ☆10Feb 18, 2016Updated 9 years ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- ☆79May 13, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Various scripts helpful in sorting collections of malware samples.☆38Aug 19, 2016Updated 9 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 2 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58May 25, 2025Updated 8 months ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- A simple tool to convert the IP to a DWORD IP☆143Jul 29, 2022Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago