Application for cracking Red Petya key based on genetic algorithms.
☆56Apr 14, 2022Updated 3 years ago
Alternatives and similar repositories for petya_recovery
Users that are interested in petya_recovery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 10 months ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 9 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Various scripts helpful in sorting collections of malware samples.☆38Aug 19, 2016Updated 9 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- A set of small utilities, helpers for PIN tracers☆39Feb 15, 2026Updated last month
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 5 months ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- ☆43Jul 2, 2018Updated 7 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 3 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- search key to restore petya encrypted mft☆612Apr 15, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆24Jul 12, 2022Updated 3 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago